A Volatility plugin to extract credentials from the memory of a OpenVPN client.
☆30Sep 26, 2014Updated 11 years ago
Alternatives and similar repositories for vol-openvpn
Users that are interested in vol-openvpn are comparing it to the libraries listed below
Sorting:
- ☆10Oct 8, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- Salt recipe to automatically secure sshd (and piss off the NSA)☆16Jun 18, 2016Updated 9 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Host files with DNS☆33Mar 1, 2016Updated 10 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆23Mar 26, 2017Updated 8 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆20Jan 2, 2013Updated 13 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Functions Catalog☆28Jul 10, 2019Updated 6 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago