Windows
- Home
- Windows
Hastening Threat Hunting: Douglas-042's PowerShell Script for Incident Response Acceleration
This PowerShell script, curated by Douglas-042, is designed to streamline and expedite threat hunting and incident response procedures. With...
WinDiff: Cross-Version Binary Comparison Tool
WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binari...
GIUDA - Ask a TGS on behalf of another user without password
GET a TGS on behalf of another user without password Scenario: you are Local Administrator and there is a logged User you want to Impersonat...
SMShell - PoC for a SMS-based shell
PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers.
ReHTTP - Simple Powershell Http shell With WEB UI
Simple Powershell Http shell With WEB UI
BugChecker - SoftICE-like kernel debugger for Windows 11
BugChecker is a SoftICE -like kernel and user debugger for Windows 11 (and Windows XP as well: it supports Windows versions from XP to 11, b...
PhoneSploit Pro - An all-in-one Hacking Tool
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Tor - Tor proxy/network services
Tor is a python based module for using tor proxy/network services on windows, osx, linux with just one click.
πππππππ πππππ
ππππππππππ
- 2FA/MFA[10]
- AI[14]
- Alexa[2]
- Amazon[1]
- Android[30]
- Automotive[3]
- Banned[1]
- BeEF[1]
- Bitcoin[1]
- Blue Team[2]
- Breaches[4]
- Browser[3]
- Brute-Force Attack[9]
- Bug Bounty[9]
- Canva[1]
- ChatGPT[17]
- Coding[16]
- Cryptocurrency[1]
- Cyber Attacks[36]
- CyberSecurity[87]
- DarkWeb[9]
- DataLeak[21]
- DDoS Attack[3]
- DeepFake[2]
- DeepSeek[3]
- Discord[4]
- Earning[4]
- Earth Day[1]
- Eid[1]
- Ethical Hacking[32]
- Exploiting[20]
- Facebook[4]
- Failure[2]
- Firefox[1]
- Flippper Zero[1]
- Gaming[10]
- GIthub[130]
- Google[19]
- GPT-4[7]
- Hacked[27]
- Hacker101[2]
- Hackers[23]
- Html[1]
- HTTP[2]
- Hydra[2]
- injection[2]
- Instagram[5]
- IOS[27]
- Islamic[2]
- Jobs[3]
- Kali Linux[18]
- Laptop[9]
- Life[1]
- Linux[31]
- Linux Hunters[2]
- Malware[6]
- Metasploit[6]
- Microsoft[5]
- Mobile[23]
- Motivation[2]
- NetCat[1]
- Networking[9]
- News[1]
- Nmap[4]
- Offensive Security[3]
- OSNIT[9]
- Parrot OS[2]
- Passwords[10]
- Payloads[9]
- Paypal[4]
- Penetration[2]
- Pentesting[37]
- Phishing[6]
- PlayStation[1]
- PowerShell[8]
- PowerSploit[2]
- Proxy[1]
- Pwned[1]
- Python[44]
- Quantum Computing[1]
- Ramadan[1]
- Red Team[17]
- Restrictions[2]
- Reverse Engineering[7]
- Roadmap[1]
- Security[80]
- Sniffing[2]
- Social[11]
- Steam[2]
- Success[4]
- Tech[92]
- Termux[12]
- Testing[1]
- TikTok[1]
- Tools[128]
- tracking[6]
- TryHackMe[4]
- UI/UX[1]
- VirtualBox[2]
- Vulnerabilities[31]
- Webtalk[3]
- WhatsApp[9]
- Wifi[9]
- Windows[34]
- Wireshark[2]
- Youtube[3]
- Zero-Day[5]
- Zoom[3]