Skip to content
View tester1010101's full-sized avatar
Block or Report

Block or report tester1010101

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tester1010101/README.md
  • 👋 Hi, I’m @tester1010101 ๑(◕‿◕)๑
  • 👀 I’m interested in ... coding/analysis/discussion!
  • 🌱 I’m currently learning ... computer science!
  • 💞️ I’m looking to collaborate on ... anything!
  • 📫 How to reach me ... Twitter >_< 🕊️

Pinned Loading

  1. InboundPopup InboundPopup Public

    🔎 Windows Defender Firewall Scanner to find "Inbound" rules. If a rule is found, an alert/pop-up is immediately sent to the user for further analysis. No downloads required! 🎷

    PowerShell

  2. MassUnzip MassUnzip Public

    👷 Mass Folder Unzipper — Unzips all .zips in the target folder, can save extraction process to a .txt file, useful for unzipping multiple folders, without user interaction. 🏗️

    PowerShell

  3. Folder2Hashes Folder2Hashes Public

    🎫 Dumps all Hash values (SHA-256) of the target location, for backup/printing purposes, + added date timestamp. 🔕

    PowerShell

  4. Services2Rules Services2Rules Public

    🧰 Convert all services from Windows Services (svchost.exe) into applicables firewall rules. Useful if you keep changing workstations. ⚖️

    PowerShell

  5. Get-Rules-Groups Get-Rules-Groups Public

    ❄️ Firewall Groups & Rules Dumper — Converts "Allow" rules to applicable commands, for Windows (PowerShell) ☂️

    PowerShell

  6. PS_Dump PS_Dump Public

    🗝️ Dumps all packages, services, processes (running), applications (installed in .MSI format). 📯

    PowerShell