Khalu / vmdk2qcow2
convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for vmdk2qcow2
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆21Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆12Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- ☆10Updated 4 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆18Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 2 years ago
- ☆8Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- ☆15Updated 2 years ago
- ☆15Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆16Updated last year
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Free Email Providers☆10Updated last year
- miscellaneous sploit scripts/hacks☆14Updated 4 months ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆14Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 6 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- ☆12Updated 2 years ago
- An injector that use PT_LOAD technique☆11Updated last year