p0dalirius / docker-volatility2Links
A volatility 2 docker for forensic investigations
☆25Updated 4 months ago
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated 11 months ago
- A multithreaded bruteforcer of argon2 hashes.☆43Updated 8 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆142Updated last year
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 7 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆154Updated 2 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- Memory mapping profiles for forensic analysis using volatility 2☆53Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆22Updated 8 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- ☆18Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Updated 5 months ago
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Updated 2 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated last month
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 7 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago