p0dalirius / volatility2-profiles
Memory mapping profiles for forensic analysis using volatility 2
☆47Updated 2 years ago
Alternatives and similar repositories for volatility2-profiles:
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
- Memory mapping profiles for forensic analysis using volatility 3☆26Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 2 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆131Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆280Updated 4 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆43Updated 8 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆158Updated 3 weeks ago
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 2 years ago
- ☆139Updated 8 months ago
- Find potential DLL Sideloads on your windows computer☆204Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- Compile SharpHound and others on Linux☆24Updated 8 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 5 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆195Updated 2 months ago
- DPAPILAB Next Gen, script collection☆82Updated 2 years ago
- Make everyone in your VLAN ASRep roastable☆190Updated 2 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 6 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆73Updated last year
- ☆90Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆183Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last month
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆87Updated this week
- Weaponizing DCOM for NTLM Authentication Coercions☆211Updated last month
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆53Updated 5 months ago
- ☆191Updated 7 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆52Updated 8 months ago