xaitax / PatchaPaloozaLinks
A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.
☆189Updated last month
Alternatives and similar repositories for PatchaPalooza
Users that are interested in PatchaPalooza are comparing it to the libraries listed below
Sorting:
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆143Updated last month
- https://lolad-project.github.io/☆84Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- A collection of tools, scripts and personal research☆155Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 2 months ago
- PowerShell Script Analyzer☆70Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Baseline a Windows System against LOLBAS☆70Updated last year
- ShellSweeping the evil.☆181Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- Analyse MSI files for vulnerabilities☆141Updated last year
- ☆138Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- All kinds of tiny shells☆65Updated 2 years ago
- My Favorite Offensive Security Scripts☆82Updated 9 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- ☆37Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Wireshark RDP resources☆220Updated 7 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆109Updated last year
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago