Useful Powershell modules.
☆11Mar 10, 2017Updated 9 years ago
Alternatives and similar repositories for powershell
Users that are interested in powershell are comparing it to the libraries listed below
Sorting:
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 9 years ago
- ☆21Jul 13, 2017Updated 8 years ago
- Mac Address Flooding Script☆11Dec 9, 2015Updated 10 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- A utility for sharing snippets easily☆11Dec 8, 2022Updated 3 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- PowerShell Module for Infoblox☆12Jun 28, 2015Updated 10 years ago
- AlienVault Open Threat Exchange App For Splunk☆10May 6, 2014Updated 11 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Apr 4, 2016Updated 9 years ago
- AHA! Website Source☆19Updated this week
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- Framework that sits on top of Splunk Enterprise Security to do auto-mitigation☆14Dec 29, 2014Updated 11 years ago
- A shell tool for visualization of changing numeric data☆16Nov 23, 2015Updated 10 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- A RADIUS authentication server audit tool☆79Oct 15, 2018Updated 7 years ago
- Connect to WiFi for free all over the world!☆24Oct 20, 2020Updated 5 years ago
- A simple platform-agnostic chaos monkey☆12May 9, 2017Updated 8 years ago
- ☆15Jun 24, 2018Updated 7 years ago
- Universal Linux Application SDK - Create once. Run everywhere.☆10Jun 25, 2018Updated 7 years ago
- A one cookbook driven OpenStack Deployment☆10Jan 18, 2019Updated 7 years ago
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- An Android app to read and write MIFARE Ultralight EV1 tags☆21Dec 28, 2019Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- correlate your Philips Hue lights to the bitcoin price on Bitfinex☆21Mar 16, 2017Updated 9 years ago
- A method for building LinuxKit images for Docker-CE with custom kernels.☆21Aug 3, 2023Updated 2 years ago
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago