AdityaSec / Vol-GUI
A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.
☆44Updated 2 years ago
Alternatives and similar repositories for Vol-GUI:
Users that are interested in Vol-GUI are comparing it to the libraries listed below
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated last year
- ☆41Updated 2 years ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- ☆119Updated 2 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- Windows for Red Teamers☆127Updated 2 years ago
- Run several volatility plugins at the same time☆112Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆118Updated last year
- Upload files done during my research.☆134Updated 2 months ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆45Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆17Updated last year
- A collection of red blue team staff☆46Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- https://lolad-project.github.io/☆74Updated 2 months ago
- Powershell script to extract information from boot PXE☆139Updated 5 years ago
- Attack Surface Discovery Tool☆108Updated 6 months ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆27Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆70Updated last year
- ☆74Updated 8 months ago
- A list of hacking/security resources that are focused on IoT☆59Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- ☆103Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆128Updated 4 months ago