Powershell

Explore 37 curated cybersecurity tools, with 15,426 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

Readibots Access Studio Logo

Identity admin platform with virtualized control plane for access mgmt

0
Axence ConnectPro Logo

Remote access and IT support tool for workstation management and diagnostics

0
ScubaGear Logo

ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.

0
ESC Logo

ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.

0
Siemens Simatic PCS 7 Hardening Tool Version 1.0 Logo

A PowerShell security assessment script that evaluates Siemens SIMATIC PCS 7 industrial control systems for security misconfigurations and vulnerabilities.

0
SharpAppLocker Logo

SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.

0
ForensicMiner v1.4 Logo

A PowerShell-based DFIR automation tool that streamlines artifact and evidence collection from Windows machines for digital forensic investigations.

0
DDE attack with PowerShell Empire Logo

Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

0
PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0
Revoke-Obfuscation v1.0 Logo

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

0
Kaiser File-less Persistence Logo

Discontinued project for file-less persistence, attacks, and anti-forensic capabilities on Windows 7 32-bit systems.

0
BitLocker Logo

Microsoft BitLocker is a Windows-integrated full volume encryption solution that protects data on devices through disk-level encryption with enterprise deployment and management capabilities.

0
PowerForensics Logo

PowerForensics is a PowerShell digital forensics framework for hard drive forensic analysis.

0
InQuest YARA Rules Logo

A collection of YARA rules for research and hunting purposes.

0
Shellclear Logo

A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.

0
DeepBlueCLI Logo

A PowerShell module for threat hunting and security analysis through Windows Event Log processing and malicious activity detection.

0
PowerGRR Logo

PowerGRR is a PowerShell API client library that automates GRR (Google Rapid Response) operations for digital forensics and incident response across multiple operating systems.

0
Hunt-Detect-Prevent Logo

Lists of sources and utilities to hunt, detect, and prevent evildoers.

0
libyara.NET Logo

A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.

0
Ultimate AppLocker Bypass List Logo

A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.

0
FLARE-VM Logo

FLARE-VM is a Windows virtual machine setup tool that automates the installation and configuration of reverse engineering and malware analysis software using Chocolatey and Boxstarter technologies.

0
PSRecon Logo

A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.

0
Meerkat Logo

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

0
CimSweep Logo

CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.

0