Banaanhangwagen / WINHELLO2hashcat
☆71Updated 2 years ago
Alternatives and similar repositories for WINHELLO2hashcat:
Users that are interested in WINHELLO2hashcat are comparing it to the libraries listed below
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆35Updated 4 years ago
- Diana Credential Recovery Framework☆48Updated last month
- ☆92Updated last year
- A list of public attacks on BitLocker☆223Updated last year
- DPAPILAB Next Gen, script collection☆76Updated 2 years ago
- ☆120Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆251Updated last year
- ☆219Updated last year
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆129Updated 10 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆129Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- A small util to brute-force prefetch hashes☆76Updated 2 years ago
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆43Updated last week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆222Updated 10 months ago
- ☆55Updated 3 months ago
- All kinds of tiny shells☆58Updated last year
- ☆296Updated 2 months ago
- ☆185Updated 11 months ago
- A C# based tool for analysing malicious OneNote documents☆109Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆68Updated last year
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Malware vulnerability intel tool for third-party attackers☆115Updated 2 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 5 months ago
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆219Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆65Updated 3 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆46Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆105Updated 5 months ago
- Lazarus analysis tools and research report☆55Updated last year