p0dalirius / docker-volatility2Links
A volatility 2 docker for forensic investigations
☆24Updated last week
Alternatives and similar repositories for docker-volatility2
Users that are interested in docker-volatility2 are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 7 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 2 months ago
- A multithreaded bruteforcer of argon2 hashes.☆40Updated 3 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated 10 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 7 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated 7 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆19Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 2 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆18Updated 11 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- Front page README of my GitHub profile☆34Updated this week
- Tool for enumerating Active Directory environments☆50Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆78Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Automate converting webshells into reverse shells.☆70Updated last month
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 7 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆18Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20Updated 3 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆38Updated this week