jtpereyda / regpolLinks
Read Registry.pol files on Linux, or anywhere Python runs!
☆16Updated 2 years ago
Alternatives and similar repositories for regpol
Users that are interested in regpol are comparing it to the libraries listed below
Sorting:
- ☆20Updated last week
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 8 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 weeks ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- ☆58Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Tools that trigger False Positive AV alerts☆53Updated 10 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated 11 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Updated 3 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆21Updated 3 weeks ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆23Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- C# User Simulation☆33Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Evtx Log (xml) Browser☆55Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ☆27Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- ☆33Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- create a "simulated internet" cyber range environment☆18Updated 4 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 2 months ago
- Continuous kerberoast monitor☆45Updated 2 years ago