Hamza-Megahed / volatility-gui
GUI for Volatility forensics tool written in PyQT5
☆60Updated 3 years ago
Alternatives and similar repositories for volatility-gui:
Users that are interested in volatility-gui are comparing it to the libraries listed below
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆111Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆86Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆43Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆26Updated last year
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- Steal Apache Solr instance Queries with or without a username and password.☆12Updated 3 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- Noob Penetration tester☆11Updated 7 months ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- CVE-2021-40444☆64Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago