Banaanhangwagen / WINHELLO2hashcatLinks
☆79Updated 3 years ago
Alternatives and similar repositories for WINHELLO2hashcat
Users that are interested in WINHELLO2hashcat are comparing it to the libraries listed below
Sorting:
- Diana Credential Recovery Framework☆63Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆101Updated last month
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆136Updated last year
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆52Updated 5 years ago
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- Run several volatility plugins at the same time☆115Updated 3 years ago
- DPAPILAB Next Gen, script collection☆91Updated 3 years ago
- ☆132Updated 2 years ago
- DEFCON 31 slide deck and video link☆65Updated 4 months ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- ☆90Updated 2 years ago
- Bitpixie exploitation PoC☆72Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- POC and Scanner for CVE-2023-24055☆64Updated 2 years ago
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated 6 months ago
- A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and rea…☆106Updated 2 weeks ago
- ☆166Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆116Updated 2 years ago
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆229Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆30Updated 4 months ago
- Linux Evidence Acquisition Framework☆118Updated last year
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆87Updated 4 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago