jtpereyda / regpol
Read Registry.pol files on Linux, or anywhere Python runs!
☆14Updated last year
Alternatives and similar repositories for regpol:
Users that are interested in regpol are comparing it to the libraries listed below
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆18Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- ☆17Updated last year
- ☆19Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆43Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated this week
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆58Updated 6 years ago
- Ansible role that Installs Mythic☆14Updated 7 months ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆10Updated 2 years ago
- wordlists for password cracking☆26Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- ☆16Updated 7 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- Random Hashcat Scrips☆24Updated 4 months ago
- Repository for LNK stuff☆29Updated 2 years ago
- ☆11Updated 4 years ago
- ☆17Updated 6 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆21Updated last year