hanasuru / vol_profile_builder
Simple volatility profile builder based on Docker container
☆22Updated 4 years ago
Alternatives and similar repositories for vol_profile_builder:
Users that are interested in vol_profile_builder are comparing it to the libraries listed below
- ☆17Updated last year
- ☆43Updated 2 years ago
- ☆159Updated 2 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆93Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆82Updated last month
- This tool allows to automatically test for Content Security Policy bypass payloads.☆39Updated 4 months ago
- Write-ups for various CTF☆183Updated 10 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆46Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆136Updated 2 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆80Updated last year
- An automatic Blind ROP exploitation tool☆193Updated last year
- A script to download all the challenges and files from the CTFd instance.☆52Updated 6 months ago
- ☆36Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆136Updated last month
- These are my personal writeups and scripts for various CTFs☆9Updated 6 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆107Updated 2 months ago
- ☆52Updated 3 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆75Updated 6 years ago
- ☆27Updated 5 months ago
- My write-ups from various CTFs☆115Updated last year
- Challenge pour l'édition 2022 du midnight flag☆16Updated 2 years ago
- Attack & Defense CTF Farm based on DestructiveFarm☆83Updated 2 months ago
- Files + Writeups for DownUnderCTF 2022 Challenges☆251Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆146Updated 5 months ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆512Updated 6 months ago
- Automatic exploit generation for simple linux pwn challenges.☆315Updated last year
- Local Privilege Escalation in polkit's pkexec☆72Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆162Updated 9 months ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- ☆182Updated 11 months ago