Banaanhangwagen / WINHELLO2hashcatLinks
☆81Updated 3 years ago
Alternatives and similar repositories for WINHELLO2hashcat
Users that are interested in WINHELLO2hashcat are comparing it to the libraries listed below
Sorting:
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆53Updated 5 years ago
- Diana Credential Recovery Framework☆63Updated 2 months ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆110Updated 2 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆33Updated this week
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆136Updated last year
- Run several volatility plugins at the same time☆115Updated 3 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- All kinds of tiny shells☆65Updated 2 years ago
- Linux Evidence Acquisition Framework☆118Updated last year
- DPAPILAB Next Gen, script collection☆92Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆140Updated last year
- Volatility3 plugins developed and maintained by the community☆60Updated 2 years ago
- Bitpixie exploitation PoC☆82Updated last month
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- ☆55Updated last year
- A repo for TPM sniffing greatness☆241Updated 2 weeks ago
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆50Updated 10 months ago
- A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and rea…☆113Updated 2 weeks ago
- A list of public attacks on BitLocker☆396Updated 3 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆176Updated 7 months ago
- Emulate and Dissect MSF and *other* attacks☆144Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Volatility, on Docker 🐳☆40Updated 2 weeks ago
- ☆205Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆223Updated 2 years ago
- Windows symbol tables for Volatility 3☆91Updated last year