p0dalirius / docker-volatility2Links
A volatility 2 docker for forensic investigations
☆24Updated 2 months ago
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 9 months ago
- A multithreaded bruteforcer of argon2 hashes.☆40Updated 5 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated last year
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 4 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆99Updated 7 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- A script to factorize integers with sagemath and factordb.☆12Updated 9 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆44Updated 8 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated 9 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆149Updated 2 years ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20Updated 3 years ago
- ☆100Updated 5 months ago
- Front page README of my GitHub profile☆34Updated last week
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆18Updated 2 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆100Updated 3 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 9 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- ☆18Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 4 months ago
- A script to enumerate valid usernames based on the requests response times.☆21Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆21Updated 6 months ago