gentilkiwi / kirandomtpm
Get random bytes from the TPM (tool + BCrypt RNG provider)
☆17Updated 4 years ago
Alternatives and similar repositories for kirandomtpm:
Users that are interested in kirandomtpm are comparing it to the libraries listed below
- ☆21Updated last year
- module for certexfil☆15Updated 2 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- CVE-2020-0601 #curveball - Alternative Key Calculator☆77Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ☆18Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- ☆16Updated 7 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆13Updated 2 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- ☆16Updated 6 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Low-level MS Windows registry files analysis tools☆20Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- ☆27Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- Lets you write arbitrary registry entries to Group Policy related .pol files (e.g. registry.pol)☆11Updated 5 years ago
- D00☆6Updated 3 years ago
- The hidden mstsc recorder player☆28Updated 5 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago