brandonprry / volatile_readerLinks
A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefile analyzer written in C# and using GTK.
☆19Updated 11 years ago
Alternatives and similar repositories for volatile_reader
Users that are interested in volatile_reader are comparing it to the libraries listed below
Sorting:
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 10 years ago
- EmPyre Web Interface☆12Updated 8 years ago
- ☆52Updated 10 years ago
- ☆26Updated 9 years ago
- ☆58Updated 8 years ago
- A Remote Administration Tool coded in C#☆20Updated 13 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- ☆65Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 9 years ago
- ☆18Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 12 years ago
- Decrypt NTDS hashes☆23Updated 12 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- A simple Nessus results viewer☆49Updated 12 years ago
- ☆85Updated 10 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- ☆19Updated 8 years ago
- ☆55Updated 8 years ago
- Network Mapping and Enumeration Framework☆22Updated 10 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 9 years ago
- A simple reflective dll example☆19Updated 9 years ago
- Download and Execute PowerShell scripts on remote hosts with ease.☆24Updated 10 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- ☆52Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 9 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago