p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆51Updated 3 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 3☆30Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 11 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆141Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 9 months ago
- Impacket is a collection of Python classes for working with network protocols.☆302Updated 3 weeks ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆162Updated last year
- A webshell plugin and interactive shell for pentesting a WordPress website.☆104Updated last week
- ☆164Updated 6 months ago
- ☆234Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 11 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- winPEAS, but for Active Directory☆171Updated 9 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- A volatility 2 docker for forensic investigations☆25Updated 4 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆130Updated 2 weeks ago
- SNMPv3 Authentication Bruteforcer☆37Updated 4 years ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆353Updated last week
- Execute commands interactively on remote Windows machines using the WinRM protocol☆314Updated 3 weeks ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Updated 3 years ago
- A tool for mapping cypher databases☆16Updated 2 years ago
- DPAPILAB Next Gen, script collection☆92Updated 3 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆166Updated 5 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆81Updated 2 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆355Updated last month
- ☆100Updated 6 months ago
- CVE-2023-2255 Libre Office☆63Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆162Updated 9 months ago