stark0de / regsaveLinks
This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives using the typical reg.exe save command.
☆10Updated 2 years ago
Alternatives and similar repositories for regsave
Users that are interested in regsave are comparing it to the libraries listed below
Sorting:
- ☆25Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 7 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 11 months ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆21Updated 5 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- Quicky serve files over http or https using flask.☆35Updated 5 months ago
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated 2 months ago
- ☆15Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Burp extension used to snip any header from all the requests.☆23Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- ☆27Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- ☆18Updated 7 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- ☆22Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 8 months ago