Banaanhangwagen / WINHELLO2hashcatLinks
☆81Updated 3 years ago
Alternatives and similar repositories for WINHELLO2hashcat
Users that are interested in WINHELLO2hashcat are comparing it to the libraries listed below
Sorting:
- Diana Credential Recovery Framework☆66Updated 3 weeks ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆138Updated last year
- bitpixie Proof of Concept - Bitlocker Decryptor☆126Updated 4 months ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆56Updated 6 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆40Updated 2 months ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- Bitpixie exploitation PoC☆92Updated 3 months ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- All kinds of tiny shells☆65Updated 3 years ago
- ☆90Updated 2 years ago
- DPAPILAB Next Gen, script collection☆94Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Updated last year
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and rea…☆115Updated 3 weeks ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆82Updated 2 years ago
- ☆35Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆143Updated last week
- ☆55Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆144Updated 4 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- ☆133Updated 2 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆73Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 2 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆142Updated last year
- ☆33Updated last year
- Initial triage of Windows Event logs☆106Updated last year