robwillisinfo / Disable-PSv2
Disabling PowerShell v2 with Group Policy
☆16Updated 2 years ago
Alternatives and similar repositories for Disable-PSv2:
Users that are interested in Disable-PSv2 are comparing it to the libraries listed below
- ☆65Updated last year
- ☆111Updated 5 years ago
- ☆60Updated 3 years ago
- ☆41Updated last year
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆90Updated last year
- Perform general security checks against AD environment☆66Updated 2 years ago
- Little PowerShell module to extract PowerShell scripts that no longer exists on disk but were run and are still in Event Logs.☆40Updated 4 years ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Ansible role for installing Sysmon with popular config files included.☆24Updated 2 years ago
- ☆28Updated 2 months ago
- Powershell Event Tracing Toolbox☆73Updated 2 years ago
- Module to update the Krbtgt password☆46Updated last year
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆32Updated last year
- Provides various Windows Server Active Directory (AD) security-focused reports.☆92Updated last month
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆42Updated last year
- Automation around Entra ID☆34Updated 2 months ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- ☆13Updated 3 years ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆94Updated 4 months ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆30Updated 3 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- AppLocker hardening policies☆25Updated 6 years ago
- ☆49Updated 4 years ago
- Kerberos Haters Guide to Zeek Threat Hunting☆25Updated 3 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆9Updated 8 months ago
- A set of Python scripts for finding threats in Office365☆50Updated last year