daddycocoaman / volpluginsLinks
Repository of Volatility3 plugins
☆22Updated 2 years ago
Alternatives and similar repositories for volplugins
Users that are interested in volplugins are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆48Updated 5 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆45Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Living Off the Foreign Land setup scripts☆70Updated 3 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- ☆27Updated 6 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆75Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- ☆23Updated last year
- Python module for running BOFs☆70Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 10 months ago
- ☆80Updated 6 months ago
- ☆69Updated last year
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆28Updated 10 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Ghosting-AMSI☆17Updated last month
- ☆41Updated 10 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- create a "simulated internet" cyber range environment☆16Updated last week
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago