Monitoring Registry and File Changes in Windows
-
Updated
Oct 13, 2023 - Python
Monitoring Registry and File Changes in Windows
scripts that afford the pentester AV bypass techniques
container registry sync images script
This tool blocks well known exe, bat, com launchers / executables of malwares (Trojans, ransomwares, worms etc)
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SYSTEM, SECURITY and SAM hives and download them back to the attacker machines.
Add a description, image, and links to the registry-hacks topic page so that developers can more easily learn about it.
To associate your repository with the registry-hacks topic, visit your repo's landing page and select "manage topics."