brandonprry / volatile_reader
A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefile analyzer written in C# and using GTK.
☆20Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for volatile_reader
- A PowerShell binding for the Unicorn Engine☆16Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- See here:☆41Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- Gmail Knocker☆21Updated 7 years ago
- SNMP Backdoor Communication Channel☆15Updated 12 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆26Updated 9 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- ☆16Updated 6 years ago
- ☆21Updated 10 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- A Remote Administration Tool coded in C#☆20Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- Empire is a pure PowerShell post-exploitation agent.☆11Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago