Repository of Volatility3 plugins
☆22Mar 22, 2023Updated 2 years ago
Alternatives and similar repositories for volplugins
Users that are interested in volplugins are comparing it to the libraries listed below
Sorting:
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ReverseDSC Orchestrator for ActiveDirectory☆21Jun 12, 2023Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 2 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆56Jul 13, 2025Updated 8 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆118Oct 8, 2023Updated 2 years ago
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- ☆17Nov 13, 2024Updated last year
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 4 months ago
- Go API to interact with radare2☆36Jan 15, 2026Updated 2 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- ☆27Feb 3, 2026Updated last month
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆53Feb 25, 2023Updated 3 years ago
- PIDX Checker Class☆21Aug 31, 2015Updated 10 years ago