p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆53Updated 3 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 3☆31Updated 3 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆142Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆303Updated 3 weeks ago
- ☆166Updated 7 months ago
- A cross platform library to write offensive and defensive security tools in Go☆130Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated last year
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- ☆235Updated 8 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 7 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 9 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆163Updated last year
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 3 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆235Updated last year
- Detect common NFS server misconfigurations☆96Updated last week
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆65Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆82Updated 2 years ago
- ☆230Updated 8 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆282Updated 11 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆323Updated 2 weeks ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆107Updated last week
- ☆100Updated 7 months ago
- rcat☆75Updated 3 years ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆290Updated 2 weeks ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆357Updated last month
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 7 months ago
- Compile SharpHound and others on Linux☆24Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆229Updated last year