p0dalirius / docker-volatility2Links
A volatility 2 docker for forensic investigations
☆24Updated last month
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- A multithreaded bruteforcer of argon2 hashes.☆40Updated 4 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 4 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆98Updated 7 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated 9 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆103Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆44Updated 8 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- Docker images of the Exegol project☆119Updated this week
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆103Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆21Updated 5 months ago
- ☆109Updated 11 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 4 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆125Updated 7 months ago
- Script to perform some hashcracking logic automagically☆76Updated 2 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 3 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆99Updated 2 months ago
- Automate converting webshells into reverse shells.☆71Updated 2 weeks ago