jtpereyda / regpolLinks
Read Registry.pol files on Linux, or anywhere Python runs!
☆16Updated 2 years ago
Alternatives and similar repositories for regpol
Users that are interested in regpol are comparing it to the libraries listed below
Sorting:
- A VS Code extension to preview XML nmap output☆44Updated 4 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- ☆18Updated 2 weeks ago
- wordlists for password cracking☆28Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Random Hashcat Scrips☆29Updated 9 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- ☆33Updated last year
- ☆24Updated last year
- Bloodhound Portable for Windows☆52Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Diana Credential Recovery Framework☆58Updated 3 weeks ago
- My Python Cookiecutter project template☆31Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆46Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- create a "simulated internet" cyber range environment☆17Updated last month
- Exfiltration based on custom X509 certificates☆26Updated last year
- ☆24Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- isodump - ISO dump utility☆40Updated 6 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Tools that trigger False Positive AV alerts☆50Updated 6 months ago
- ☆22Updated 4 years ago