[go: up one dir, main page]

Showing 19 open source projects for "json"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Airlock Digital - Application Control (Allowlisting) Made Simple Icon
    Airlock Digital - Application Control (Allowlisting) Made Simple

    Airlock Digital delivers an easy-to-manage and scalable application control solution to protect endpoints with confidence.

    For organizations seeking the most effective way to prevent malware and ransomware in their environments. It has been designed to provide scalable, efficient endpoint security for organizations with even the most diverse architectures and rigorous compliance requirements. Built by practitioners for the world’s largest and most secure organizations, Airlock Digital delivers precision Application Control & Allowlisting for the modern enterprise.
    Learn More
  • 1
    ScubaGear

    ScubaGear

    Automation to assess the state of your M365 tenant against CISA

    ScubaGear is a PowerShell-based assessment tool developed by CISA to verify that Microsoft 365 tenant configuration aligns with Secure Cloud Business Application (SCuBA) baselines. It automates scanning of M365 environments like Exchange, Defender, Teams, and SharePoint, and outputs compliance reports to help administrators align with best practice security configurations.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Scoop Installer

    Scoop Installer

    A command-line installer for Windows

    ...If you have built software that you would like others to use, Scoop is an alternative to building an installer (like MSI or InnoSetup). You just need to compress your app to a .zip file and provide a JSON manifest that describes how to install it. Scoop downloads and manages packages in a portable way, keeping them neatly isolated in ~\scoop. It won't install files outside its home, and you can place a Scoop installation wherever you like. For terminal applications, Scoop creates shims, a kind of command-line shortcut, inside the ~\scoop\shims folder, which is accessible in the PATH. ...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 3
    ImportExcel

    ImportExcel

    PowerShell module to import/export Excel spreadsheets, without Excel

    ImportExcel is a popular PowerShell module that enables reading, writing, and manipulating Excel spreadsheets without requiring Microsoft Excel to be installed on the host. It exposes straightforward cmdlets like Import-Excel and Export-Excel that convert between Excel sheets and PowerShell objects, making it simple to pipeline tabular data into reporting and automation flows. Advanced features include adding and formatting tables, setting number/date formats, creating charts, and applying...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    Windows Terminal Shell

    Windows Terminal Shell

    Install/uninstall scripts for Windows Terminal context menu items

    ...WSL distros, custom PowerShell builds, alternative shells like Git Bash, zsh via WSL) in Windows Terminal in an automated or reproducible fashion. The project includes scripts (PowerShell, possibly JSON manipulations) to scan available shells, generate Terminal profiles, and update or sync Windows Terminal’s settings.json with appropriate icons, command lines, and environment variables. This helps users maintain consistent shell environments across multiple machines (e.g. developers who use custom shells or cross-platform setups).
    Downloads: 3 This Week
    Last Update:
    See Project
  • Easily build robust connections between Salesforce and any platform Icon
    Easily build robust connections between Salesforce and any platform

    We help companies using Salesforce connect their data with a no-code Salesforce-native solution.

    Like having Postman inside Salesforce! Declarative Webhooks allows users to quickly and easily configure bi-directional integrations between Salesforce and external systems using a point-and-click interface. No coding is required, making it a fast and efficient and as a native solution, Declarative Webhooks seamlessly integrates with Salesforce platform features such as Flow, Process Builder, and Apex. You can also leverage the AI Integration Agent feature to automatically build your integration templates by providing it with links to API documentation.
    Learn More
  • 5
    Scoop Main

    Scoop Main

    The default bucket for Scoop

    ...When a user installs Scoop, the Main bucket is automatically configured, so users can immediately install common command-line tools and utilities without adding extra buckets. The manifests in Main are JSON files that describe how to download, install, uninstall, and manage versions of apps (including dependencies, checksums, etc.). Because it’s the default bucket, maintainers apply stricter validation and review policies to keep Main reliable and safe compared to more experimental or niche buckets. Community contributions are encouraged via pull requests, and the bucket typically evolves with updates, new apps, and deprecations to reflect what users commonly need.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    IntuneManagement

    IntuneManagement

    Copy, export, import, delete, document and compare policies

    IntuneManagement is a collection of scripts, modules, and automation patterns for administering Microsoft Intune environments at scale. It provides helpers to manage device enrollment, configuration profiles, compliance rules, application assignments, and reporting, often leveraging PowerShell and the Microsoft Graph API to perform bulk operations. The toolkit is aimed at IT pros who must apply consistent policies across many endpoints, offering idempotent commands and templates to codify...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Testimo

    Testimo

    Testimo is a PowerShell module for running health checks for AD

    Testimo is a PowerShell-based test automation framework that simplifies writing, running, and reporting tests for infrastructure and script libraries. It provides constructs to define test cases, assertions, setup/teardown sequences, and grouping so validation logic is clear and maintainable. Designed for operations and platform engineers, Testimo focuses on verifying infrastructure state (configuration settings, service availability, registry keys) rather than purely unit-level code, making...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Domain Password Spray

    Domain Password Spray

    A tool written in PowerShell to perform password assessments

    DomainPasswordSpray is a focused security tool designed to perform enterprise-scale password spraying assessments against Active Directory environments. It automates the process of attempting common or customized passwords against many accounts while respecting timing and throttling controls to reduce obvious lockout noise. The project includes features for credential list management, target selection (users, service accounts, or collections), and configurable rate limits so testers can tune...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Jesta I.S. | Enterprise Software For Retail and Supply Chain Icon
    Jesta I.S. | Enterprise Software For Retail and Supply Chain

    Transition from fragmented entry-level or legacy systems to an enterprise suite.

    Unify your people and operations across all departments and channels. Discover end-to-end retail, wholesale, and supply chain management software suites designed to scale.
    Learn More
  • 10
    malware-samples

    malware-samples

    A collection of malware samples and relevant dissection information

    This repo is a public collection of malware samples and related dissection/analysis information, maintained by InQuest. It gathers various kinds of malicious artifacts, executables, scripts, macros, obfuscated documents, etc., with metadata (e.g., VirusTotal reports), file carriers, and sample hashes. It’s intended for malware analysts/researchers to help study how malware works, how they are delivered, and how it evolves.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 11
    MicroBurst

    MicroBurst

    A collection of scripts for assessing Microsoft Azure security

    MicroBurst is a PowerShell toolkit from NetSPI focused on assessing Microsoft Azure security by automating discovery, enumeration, and targeted auditing of cloud services and configurations. It bundles many functions to enumerate Azure resources (subscriptions, VMs, storage accounts, container registries, App Services and more), probe common misconfigurations, and harvest sensitive artifacts when available (for example storage blobs, keys, automation account credentials, and other...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PowerHub

    PowerHub

    A post exploitation tool based on a web application

    ...Authentication and remoting are handled idiomatically via PowerShell remoting or credential stores, enabling both interactive and scheduled runs. Built-in reporting features aggregate results into human-readable summaries and machine-friendly outputs (CSV/JSON) for pipeline consumption or ticketing integration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PostInstallWizard-PIW
    ...It provides a local, script-based, transparent alternative to older post-install tools (such as WPI/Windows Post-Install Wizard ), without relying on deprecated technologies (Internet Explorer engine, ActiveX, etc.). PIW supports: Silent installation of EXE / MSI applications Deployment of portable applications JSON-based configuration Full user control and local execution This project is developed without formal programming background, with assistance from ChatGPT, and is published as an alpha release. PIW is not affiliated with WPI and does not claim to replace it, but should be considered a spiritual successor adapted to modern Windows environments. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 14
    Ultimate AppLocker Bypass List

    Ultimate AppLocker Bypass List

    The most common techniques to bypass AppLocker

    UltimateAppLockerByPassList is a community-curated repository that collects known techniques, patterns, and candidate binaries that have been observed or proposed to bypass Microsoft AppLocker and similar executable control policies. The project functions as a living catalog: entries list binaries, script hosts, and patterns that researchers have tested or reported in the wild, along with notes about context, platform constraints, and mitigation ideas. It is aimed primarily at defenders,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    PwshPaint

    PwshPaint

    A PowerShell Module for drawing pixelated art in the terminal

    PwshPaint is a fun and quirky pixel art drawing program made entirely in PowerShell, showcasing the flexibility of the scripting language. It provides a simple terminal-based interface for drawing and editing pixel art directly from the PowerShell console, making it a creative way to explore programming concepts or amuse fellow devs.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    DeepBlueCLI

    DeepBlueCLI

    PowerShell Module for Threat Hunting via Windows Event Logs

    ...It parses common sources—including Windows Security, System, Application, PowerShell logs, and Sysmon event ID 1—then applies a rich set of detection heuristics for things like suspicious account changes, password guessing and spraying, service tampering, PowerShell obfuscation and download-string usage, long or unusual command lines, and credential dumping attempts. Output is emitted as native PowerShell objects so analysts can pipe results to CSV, JSON, HTML, GridView, or custom pipelines for further triage and reporting. The codebase includes helpers for command-line decoding and de-obfuscation (automatic base64/deflate handling), safelisting/hash workflows (DeepBlueHash), and sample EVTX files so teams can test the tool on realistic attack traces.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Active Directory Exploitation

    Active Directory Exploitation

    A cheat sheet that contains common enumeration and attack methods

    Active-Directory-Exploitation-Cheat-Sheet is a comprehensive, community-curated cheat sheet that collects practical enumeration commands, attack techniques, and quick references for attacking and auditing Windows Active Directory environments. The repository is organized as a stepwise kill-chain: recon, domain enumeration, local privilege escalation, user hunting, BloodHound guidance, lateral movement, persistence, domain-admin takeover, cross-trust attacks, data exfiltration, and a toolbox...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Security Datasets

    Security Datasets

    Re-play Security Events

    Security‑Datasets is a community-driven repository maintained by the Open Threat Research Forge (OTRF) that curates publicly available malicious and benign datasets for threat-hunting, machine learning, event analysis, and cybersecurity research. Datasets include Windows events, logs, alerts, and simulated attack data to support detection engineering and academic research.
    Downloads: 7 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next