AdityaSec / Vol-GUILinks
A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.
☆45Updated 3 years ago
Alternatives and similar repositories for Vol-GUI
Users that are interested in Vol-GUI are comparing it to the libraries listed below
Sorting:
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Upload files done during my research.☆165Updated 6 months ago
- ☆119Updated 3 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- ☆42Updated 3 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 3 years ago
- ☆136Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆143Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 3 years ago
- PoC_CVEs☆163Updated last week
- https://lolad-project.github.io/☆81Updated 9 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Practice Labs☆100Updated 4 years ago
- ☆29Updated 4 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated 6 months ago
- ☆160Updated last year
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆146Updated last year
- Attack Surface Discovery Tool☆110Updated last year
- ☆122Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆280Updated 2 years ago
- Linux Evidence Acquisition Framework☆118Updated last year
- ☆48Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆127Updated last year