deadjakk / Reg1c1de
Registry permission scanner written in C# for finding potential privesc avenues within registry
☆85Updated 4 years ago
Alternatives and similar repositories for Reg1c1de:
Users that are interested in Reg1c1de are comparing it to the libraries listed below
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- ☆94Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- This repo is dedicated to a powerpoint exploit☆35Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Code Exec via Excel☆87Updated 7 years ago
- ☆9Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- ☆39Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago
- Port of Invoke-Excel4DCOM☆105Updated 5 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- ☆46Updated 3 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆85Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆48Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago