Wednesday, December 2, 2020
Home Tags Windows Registry

Tag: Windows Registry

Must Need

h2cSmuggler : HTTP Request Smuggling Over HTTP/2 Cleartext (H2C)

h2cSmuggler : HTTP Request Smuggling Over HTTP/2 Cleartext (H2C)

h2cSmuggler smuggles HTTP traffic past insecure edge-server proxy_pass configurations by establishing HTTP/2 cleartext (h2c) communications with h2c-compatible back-end servers, allowing a bypass...
Scallion : GPU-Based Onion Hash Generator

Scallion : GPU-Based Onion Hash Generator

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono (tested in...
Cnitch : Container Snitch Checks Running Processes Under The Docker Engine

Cnitch : Container Snitch Checks Running Processes Under The Docker Engine

Cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any processes which...
DeepBlueCLI : A PowerShell Module For Threat Hunting Via Windows Event Logs

DeepBlueCLI : A PowerShell Module For Threat Hunting Via Windows Event...

DeepBlueCLI is a PowerShell Module for Threat Hunting via Windows Event Logs. Usage .DeepBlue.ps1...
X64Dbg : An Open-Source X64/X32 Debugger For Windows

X64Dbg : An Open-Source X64/X32 Debugger For Windows

X64Dbg is an open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the...
CrauEmu : uEmu Extension For Developing & Analyzing Payloads For Code-Reuse Attacks

CrauEmu : uEmu Extension For Developing & Analyzing Payloads For Code-Reuse...

crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks. Installation
Pulsar : Network Footprint Scanner Platform

Pulsar : Network Footprint Scanner Platform

Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization public facing...