skelsec / aiowinregLinks
Registry hive parsing the async way
☆21Updated 2 months ago
Alternatives and similar repositories for aiowinreg
Users that are interested in aiowinreg are comparing it to the libraries listed below
Sorting:
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- ☆12Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- NanoDumpInject from https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/ , minor edits with a few syscalls☆11Updated 2 years ago
- ☆36Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- ☆9Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Unamanged PS with Named Pipes☆9Updated 4 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 11 months ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- Tool to manage user privileges☆28Updated 5 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆14Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆18Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago