Lessons learned using Cloudflare Access SSO with Entra ID
Lessons learned while exploring and implementing Workers
Screenshot showing the location in the user group policy tree where Microsoft's CoPilot can be disabled.
For standalone hosts: reg add HKCU\Software\Policies\Microsoft\Windows\WindowsCopilot /v TurnOffWindowsCopilot /t REG_DWORD /d 1 /f
This script is a PowerShell starter example to connect your project to Duo's Admin API
I notice loads of people online struggling to get API authentication working. This minimal example successfully implements Admin API authentication in PowerShell with no dependencies.
This script will connect to Active Directory, get a list of hosts based on the user configured search path, and check each host for unquoted service path vulnerabilities. Results are printed to the PowerShell console
This script will connect to a specified SharePoint Online site or subsite and generate a list of all items missing mandatory metadata
This script is a PowerShell starter example to connect your project to ThreatConnect's API
A very simple query console to fetch Indicators. Helpful for exploring data within ThreatConnect.
The following record types are supported:
- IPs (malicious IP addresses)
- Hosts (malicious hostnames)
- URLs (malicious web URLs)
- Email (malicious email addresses)
- File (malicious file hashes)
Appropriate for enterprise deployments; Great for removing all of the bundled games and useless apps, tracking and telemetry settings
If you ever encounter the following message when trying to edit an attribute in AD Users and Computers or ADSIEdit: "There is no editor registered to handle this attribute type."