scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition
☆15Oct 25, 2016Updated 9 years ago
Alternatives and similar repositories for PowerShell
Users that are interested in PowerShell are comparing it to the libraries listed below
Sorting:
- ☆23Jun 1, 2022Updated 3 years ago
- PowerShell & Python: A side-by-side comparison☆28Aug 10, 2020Updated 5 years ago
- ☆33Feb 27, 2018Updated 8 years ago
- ☆33May 11, 2021Updated 4 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Inspired by Netmiko & Netdev to make scripts run much faster☆12Jun 6, 2019Updated 6 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated last week
- ☆12Apr 20, 2025Updated 10 months ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- A POC for the Java agent of Elastic APM☆12Mar 1, 2018Updated 7 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- A logging handler for Splunk. Lets you send information to Splunk directly from your Python code.☆23Jul 28, 2015Updated 10 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- A sample IE BHO for logging Internet Explorer's POST data.☆10Dec 29, 2017Updated 8 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago