stark0de / regsave
This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives using the typical reg.exe save command.
☆10Updated 2 years ago
Alternatives and similar repositories for regsave:
Users that are interested in regsave are comparing it to the libraries listed below
- Burp extension used to snip any header from all the requests.☆22Updated last year
- ☆24Updated last year
- Cobalt Strike BOFS☆15Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 6 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- ☆21Updated last year
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆32Updated last week
- Proof of Concept Exploit for CVE-2024-9465☆28Updated 4 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 8 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 6 months ago
- Multithreaded spraying of a password on all accounts of a domain.☆18Updated last week
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated 11 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆21Updated last year
- Tools used for Pentesting☆22Updated last year
- Right-To-Left Override POC☆34Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- ☆27Updated last year
- A Moodle Scanner☆39Updated 3 months ago
- Simple recon tool automates your recon process☆16Updated last year
- Tool for scanning domains for .git directories.☆12Updated last year
- ☆28Updated last year
- MacroExploit use in excel sheet☆20Updated last year