WMI Explorer
☆92Jan 5, 2026Updated 2 months ago
Alternatives and similar repositories for wmie
Users that are interested in wmie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A tool to play with scheduled tasks on Windows, in Rust☆122Nov 1, 2025Updated 4 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Purple-team telemetry & simulation toolkit.☆111Dec 16, 2025Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Let's make quick work of GraphQL instances ;)☆24Mar 8, 2026Updated 3 weeks ago
- ☆192Mar 13, 2026Updated 2 weeks ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Mar 22, 2026Updated last week
- Android webviews and securiy☆23Sep 18, 2025Updated 6 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python tool to automatically perform SPN-less RBCD attacks.☆126Jan 7, 2026Updated 2 months ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- ☆22Mar 6, 2026Updated 3 weeks ago
- A C# utility for interacting with SCOM☆97Dec 2, 2025Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆96Jan 27, 2026Updated 2 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Jul 15, 2020Updated 5 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- Position-independent Reflective Loader for macOS☆120Feb 19, 2026Updated last month
- ☆18Apr 15, 2024Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- ☆24Mar 12, 2025Updated last year
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆118Oct 30, 2025Updated 5 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆240Oct 30, 2025Updated 5 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆247Dec 18, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated 2 weeks ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 3 months ago
- Linker for Beacon Object Files☆171Feb 22, 2026Updated last month
- Impacket☆50Feb 25, 2026Updated last month
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆289Jan 12, 2026Updated 2 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆41Dec 12, 2025Updated 3 months ago