hanasuru / vol_profile_builderLinks
Simple volatility profile builder based on Docker container
☆21Updated 4 years ago
Alternatives and similar repositories for vol_profile_builder
Users that are interested in vol_profile_builder are comparing it to the libraries listed below
Sorting:
- ☆16Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆100Updated 4 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆104Updated 4 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆147Updated 7 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆48Updated 2 years ago
- ☆164Updated 2 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- ☆47Updated 3 years ago
- A script to download all the challenges and files from the CTFd instance.☆56Updated 2 weeks ago
- ☆38Updated 2 years ago
- Repository to index useful tools for CTF's☆26Updated 3 weeks ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Challenge pour l'édition 2022 du midnight flag☆16Updated 3 years ago
- Write-ups for various CTF☆192Updated last year
- These are my personal writeups and scripts for various CTFs☆8Updated 3 months ago
- ☆26Updated 10 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆148Updated 6 months ago
- Files + Writeups for DownUnderCTF 2022 Challenges☆251Updated 2 years ago
- A curated list of resources for the OSED journey.☆64Updated 3 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- Source code and writeups for all challenges☆16Updated 3 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆54Updated this week
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆558Updated 11 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆54Updated last year
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 9 months ago
- ☆186Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆159Updated 7 months ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆112Updated last year
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago