Repository of Volatility3 plugins
☆22Mar 22, 2023Updated 2 years ago
Alternatives and similar repositories for volplugins
Users that are interested in volplugins are comparing it to the libraries listed below
Sorting:
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- ReverseDSC Orchestrator for ActiveDirectory☆21Jun 12, 2023Updated 2 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆53Feb 25, 2023Updated 3 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- ☆27Feb 3, 2026Updated 3 weeks ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 6 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 2 weeks ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Dec 5, 2025Updated 2 months ago
- ☆29Jan 19, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Convenience tool for hashcat☆121Aug 26, 2025Updated 6 months ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- ☆65May 21, 2024Updated last year
- ☆29Nov 13, 2020Updated 5 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆38Nov 21, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- MiniDump a process in memory with rust☆37Jun 20, 2021Updated 4 years ago
- ☆10Mar 5, 2021Updated 4 years ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago