p0dalirius / docker-volatility2Links
A volatility 2 docker for forensic investigations
☆23Updated last year
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆152Updated 5 months ago
- A multithreaded bruteforcer of argon2 hashes.☆39Updated last month
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 2 weeks ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 8 months ago
- Front page README of my GitHub profile☆34Updated last week
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 3 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 4 months ago
- Tor onion address lookup☆39Updated 5 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆52Updated 5 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 11 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 3 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆12Updated 5 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 5 months ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 4 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆110Updated last week
- All kinds of tiny shells☆58Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆19Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Tool for enumerating Active Directory environments☆47Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago