adoxa / regdumpLinks
Dump Windows registry hives as text.
☆17Updated 7 years ago
Alternatives and similar repositories for regdump
Users that are interested in regdump are comparing it to the libraries listed below
Sorting:
- BITS Transfers Manager☆45Updated 8 months ago
- History and analysis of Windows desktop images☆19Updated 5 years ago
- Example/starter code for custom Windows application compatibility shims☆38Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆15Updated 7 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Updated 6 years ago
- INF Studio for easier working with driver installation files☆39Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated 2 years ago
- Utility to remove digital code signature from binary PE files in Windows.☆17Updated 4 years ago
- Tool to extract contents from the memory of Windows systems.☆13Updated 2 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Updated last year
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated last year
- ☆19Updated 3 years ago
- Windows Registry binary files comparison Tool.☆26Updated 2 months ago
- The common parts of the Sysinternals Sysmon tool shared between the Windows and Linux versions.☆65Updated last week
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Updated 12 years ago
- ☆58Updated 2 months ago
- Portable Executable launcher for Windows NT bypassing loader☆74Updated 5 months ago
- A tool for Windows that can make any program work within file-system transactions.☆59Updated 5 years ago
- ☆20Updated 8 months ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆30Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- ☆17Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated this week
- ☆30Updated 3 years ago
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆41Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- ☆30Updated 5 months ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year