A volatility 2 docker for forensic investigations
☆25Sep 10, 2025Updated 5 months ago
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- A script to factorize integers with sagemath and factordb.☆12Feb 11, 2025Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆26Feb 11, 2025Updated last year
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- A multithreaded bruteforcer of argon2 hashes.☆42Jun 4, 2025Updated 8 months ago
- A small C/C++ library to lookup Windows error codes.☆21Jul 1, 2024Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Nov 10, 2025Updated 3 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago
- A simple python script to download videos hosted on streamable from their link☆11Mar 16, 2024Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Dec 5, 2025Updated 2 months ago
- Command line tool to fetch, decode and brute-force CodeIgniter session cookies by guessing and bruteforcing secret keys.☆16Jan 31, 2025Updated last year
- A Python script to list valid emails of GSuite accounts.☆15Feb 11, 2025Updated last year
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- List of linux kernel versions and download links in JSON☆10Jun 29, 2024Updated last year
- Pentest report framework without data send☆19Sep 23, 2025Updated 5 months ago
- A webshell plugin and interactive shell for pentesting JoGet application.☆13May 19, 2022Updated 3 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆25Mar 17, 2024Updated last year
- A webshell plugin and interactive shell for pentesting a WordPress website.☆109Jan 30, 2026Updated last month
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆16Oct 8, 2024Updated last year
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- This repository contains the list of windows builds as parsable JSON files.☆17Apr 24, 2022Updated 3 years ago
- Python script implementing the favicon hash trick to find subdomains.☆38Mar 28, 2023Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆22May 19, 2025Updated 9 months ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Jan 6, 2023Updated 3 years ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆24Oct 2, 2023Updated 2 years ago
- A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks☆30May 3, 2022Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- List of Hardware Wallets for Digital Forensics☆26Dec 19, 2024Updated last year
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 10 years ago
- 🗺 A map of OSINT tools.☆19Jul 5, 2023Updated 2 years ago