p0dalirius / docker-volatility2
A volatility 2 docker for forensic investigations
☆20Updated last year
Alternatives and similar repositories for docker-volatility2:
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
- A multithreaded bruteforcer of argon2 hashes.☆38Updated last month
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆14Updated 11 months ago
- VM Lab for security☆9Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆40Updated last month
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 3 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆51Updated 3 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last month
- A python library to interact with Pwndoc instances for pentest reports generation☆16Updated last month
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- ☆37Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆10Updated last month
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- ☆18Updated 6 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆128Updated 5 months ago
- Windows priviledge escalation script☆13Updated last month
- Unicode Security Toolkit☆34Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 7 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 4 months ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- Obfuscate the bytes of your payload with an association dictionary☆33Updated 4 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆17Updated 3 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆13Updated 5 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Make an Linux Kernel rootkit visible again.☆47Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆119Updated last year
- Repo for all my exploits/PoCs☆50Updated last month