nccgroup / grepify
Grepify the GUI Regex Text Scanner for Code Reviewers
☆22Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for grepify
- ☆8Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- ☆16Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Lets you write arbitrary registry entries to Group Policy related .pol files (e.g. registry.pol)☆11Updated 5 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Windows productivity tweaks☆14Updated 4 years ago
- ☆22Updated 10 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 2 years ago
- Monitor the textual data pasted into Windows clipboard☆28Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆16Updated 4 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆16Updated 4 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Updated 6 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆11Updated 7 years ago
- Miscellaneous for various things☆22Updated this week
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- ☆16Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago