stark0de / regsaveLinks
This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives using the typical reg.exe save command.
β10Updated 3 years ago
Alternatives and similar repositories for regsave
Users that are interested in regsave are comparing it to the libraries listed below
Sorting:
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- γπͺγLinux Backdoor based on ICMP protocolβ63Updated last year
- Enumerate AWS cloud resources based on provided credentialβ51Updated 3 years ago
- Multithreaded spraying of a password on all accounts of a domain.β26Updated 11 months ago
- Automated HTTP Request Repeating With Burp Suiteβ40Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β14Updated last year
- quick and dirty proof-of-concept to hide shells in imagesβ51Updated last year
- APK Infrastructure Investigatorβ65Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919β25Updated last year
- Cobalt Strike BOFSβ16Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)β23Updated last year
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegramβ17Updated last year
- β27Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")β57Updated 2 years ago
- H&E- Burp Highlighter and Extractorβ18Updated 2 years ago
- Quicky serve files over http or https using flask.β35Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaksβ29Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β75Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URLβ29Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.β24Updated last year
- β22Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ47Updated last year
- β46Updated 3 months ago
- CVE-2023-20198 & 0Day Implant Scannerβ33Updated 2 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, β¦β25Updated 7 months ago
- Personal notes from Red teamer for Blue/Red/Purple.β57Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtectβ30Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.β40Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhilβ21Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago