p0dalirius / docker-volatility2Links
A volatility 2 docker for forensic investigations
☆24Updated 3 months ago
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 10 months ago
- A multithreaded bruteforcer of argon2 hashes.☆42Updated 6 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆140Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆101Updated 9 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 6 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆51Updated 3 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated last week
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated 10 months ago
- Automate converting webshells into reverse shells.☆71Updated 3 weeks ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆21Updated 7 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 10 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆40Updated last month
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆100Updated 4 months ago
- A script to factorize integers with sagemath and factordb.☆12Updated 10 months ago
- ☆13Updated 2 years ago