HellishPn / Volatility-MM-CSLinks
Volatility MindMap & Cheat Sheet
☆29Updated 3 years ago
Alternatives and similar repositories for Volatility-MM-CS
Users that are interested in Volatility-MM-CS are comparing it to the libraries listed below
Sorting:
- Easy to configure Honeypot for Blue Team☆43Updated 5 months ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Just another vulnerable web application.☆36Updated last year
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- ☆25Updated 5 months ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- ☆90Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆81Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- ☆42Updated 8 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago