{"id":22748007,"url":"https://github.com/githubfoam/windows_sandbox","last_synced_at":"2025-03-30T05:42:30.872Z","repository":{"id":113756842,"uuid":"299877748","full_name":"githubfoam/windows_sandbox","owner":"githubfoam","description":"windows sandbox","archived":false,"fork":false,"pushed_at":"2022-03-02T11:00:00.000Z","size":217,"stargazers_count":2,"open_issues_count":2,"forks_count":0,"subscribers_count":1,"default_branch":"master","last_synced_at":"2025-02-05T07:49:40.231Z","etag":null,"topics":["github-actions","msbuild","office365","pester","pester-tests","powershell","powershell-gallery","psdeploy","psgallery","psscriptanalyzer","scoop","static-code-analysis"],"latest_commit_sha":null,"homepage":"","language":"PowerShell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/githubfoam.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2020-09-30T09:58:23.000Z","updated_at":"2022-12-11T09:29:36.000Z","dependencies_parsed_at":null,"dependency_job_id":"a98aa4a2-7dff-4839-8e24-afbb591888de","html_url":"https://github.com/githubfoam/windows_sandbox","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fwindows_sandbox","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fwindows_sandbox/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fwindows_sandbox/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fwindows_sandbox/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/githubfoam","download_url":"https://codeload.github.com/githubfoam/windows_sandbox/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246281216,"owners_count":20752207,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["github-actions","msbuild","office365","pester","pester-tests","powershell","powershell-gallery","psdeploy","psgallery","psscriptanalyzer","scoop","static-code-analysis"],"created_at":"2024-12-11T03:19:01.795Z","updated_at":"2025-03-30T05:42:30.851Z","avatar_url":"https://github.com/githubfoam.png","language":"PowerShell","readme":"# windows_sandbox\n\n![windows CI workflow](https://github.com/githubfoam/windows_sandbox/workflows/windows%20CI%20workflow/badge.svg)  \n\n![os matrix CI workflow](https://github.com/githubfoam/windows_sandbox/workflows/os%20matrix%20CI%20workflow/badge.svg?branch=master) \n\n~~~\nA command-line installer for Windows\nhttps://scoop.sh/\n\nThe Package Manager for Windows\nhttps://chocolatey.org/  \n\nUsing a specific shell\nhttps://docs.github.com/en/free-pro-team@latest/actions/reference/workflow-syntax-for-github-actions#using-a-specific-shell\n\nAvailable Environments\nhttps://github.com/actions/virtual-environments\n~~~\n\n~~~\nthe Sam Spade utility provides all these tools and more in a graphical user interface.\nassist in determining the source of Internet traffic. These tools include: whois,traceroute, finger, ping, and nslookup\nhttps://www.sans.org/reading-room/whitepapers/tools/sam-spade-934\nHyena is designed to both simplify and centralize nearly all of the day-to-day management tasks, while providing new capabilities for system administration\nhttps://www.systemtools.com/hyena/\nTaskShell, enumeration, recon\nhttps://github.com/RiccardoAncarani/TaskShell\nSSDP Service Discovery\nhttps://github.com/rvrsh3ll/SharpSSDP\nOpen source Active Directory security audit framework\nhttps://github.com/airbus-seclab/bta\n~~~\n~~~\nUAC-bypass\nhttps://github.com/winscripting/UAC-bypass\nPowershell SAP assessment tool\nhttps://github.com/airbus-seclab/powersap\n~~~\n~~~\nW3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities\nskipfish is an active web application security reconnaissance tool\nWfuzz is a tool for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforcing GET and POST parameters for different kinds of injections (SQL, XSS, LDAP, etc.), bruteforcing form parameters (user/password), fuzzing\nWapiti allows you to audit the security of your web applications\nhttps://sectools.org/tag/fuzzers/\nAn extension for the original Fiddler web debugger to analyze malicious web traffic\nhttps://github.com/malwareinfosec/EKFiddle\nBurp Suite Community Edition,manual tools for exploring web security. Proxy your HTTPS traffic, edit and repeat requests, decode data\nhttps://portswigger.net/burp/communitydownload\nHetty is an HTTP toolkit for security research\nhttps://github.com/dstotijn/hetty\nWinDump is the Windows version of tcpdump\nhttps://www.winpcap.org/windump/default.htm\n~~~\n~~~\ncpu_rec is a tool that recognizes cpu instructions in an arbitrary binary file. It can be used as a standalone tool, or as a plugin for binwalk\nhttps://github.com/airbus-seclab/cpu_rec\nFirmware Analysis Tool \nhttps://github.com/ReFirmLabs/binwalk\nDebugging Tools for Windows 10 (WinDbg)\nhttps://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools  \nGRR Rapid Response: remote live forensics for incident response\nhttps://github.com/google/grr\nCommand line interface to dump LSASS memory to disk via SilentProcessExit \nhttps://github.com/deepinstinct/LsassSilentProcessExit\n~~~\nvagrant\n~~~\nbuilds Windows 2012R2/10/2016/2019 base Vagrant boxes using Packer and VirtualBox/Hyper-V/libvirt/qemu\nhttps://github.com/rgl/windows-vagrant\n~~~\n\n~~~\nGitHub’s official command line tool\nhttps://github.com/cli/cli\n~~~\noffice365\n~~~\nhttps://github.com/eshlomo1/Microsoft-365-for-IT-and-Security  \nhttps://github.com/Vet-2-tech/Office365-Security-Compliance-Screen-Scrapping-Checklist  \nhttps://github.com/cscannell-inacloud/Office365-Security-Docs/tree/AndreaBarr-patch-1/SecurityCompliance  \nhttps://github.com/diogo-fernan/powershell-ad-office365  \nElastic Beat for fetching and shipping Office 365 audit events \nhttps://github.com/counteractive/o365beat  \nhttps://github.com/londonc/LMC-PSC  \nGets events from the Office 365 unified audit log and outputs their details into the pipeline\nhttps://github.com/counteractive/Get-UnifiedAuditLog  \nEnumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page\nhttps://github.com/gremwell/o365enum  \n~~~\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgithubfoam%2Fwindows_sandbox","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgithubfoam%2Fwindows_sandbox","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgithubfoam%2Fwindows_sandbox/lists"}