daddycocoaman / volplugins
Repository of Volatility3 plugins
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for volplugins
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆83Updated 2 years ago
- ☆43Updated 4 months ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆44Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- A PoC for achieving persistence via push notifications on Windows☆45Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Living Off the Foreign Land setup scripts☆63Updated 3 weeks ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆31Updated 3 weeks ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Slide decks and/or materials from conference presentations☆54Updated 2 years ago
- ☆68Updated 2 years ago
- ☆68Updated last year
- ☆18Updated 7 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- ☆67Updated 3 months ago
- ☆22Updated 11 months ago
- Microsoft Graph API post-exploitation toolkit☆92Updated 4 months ago