Volatility plugin to extract X screenshots from a memory dump
☆37May 15, 2018Updated 7 years ago
Alternatives and similar repositories for linux_screenshot_xwindows
Users that are interested in linux_screenshot_xwindows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 3 months ago
- ☆63Mar 21, 2018Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- ☆99May 3, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- An information gathering tool to collect git commit emails in version control host services☆152May 5, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 8 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- Yet Another MOnitoring Tool☆61Apr 21, 2018Updated 7 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆144Dec 9, 2025Updated 3 months ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- public bugs/proof of concepts☆48Mar 10, 2021Updated 5 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- SQL scripts for querying event logs☆21Jul 12, 2017Updated 8 years ago
- Power line communication through processor load modulation☆12Jul 24, 2017Updated 8 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Bodhi - Client-side Vulnerability Playground☆122Jun 1, 2021Updated 4 years ago