p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆47Updated 2 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- A python module to explore the object tree to extract paths to interesting objects in memory.☆97Updated 4 months ago
- Memory mapping profiles for forensic analysis using volatility 3☆26Updated 3 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 7 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 2 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 4 months ago
- A cross platform library to write offensive and defensive security tools in Go☆90Updated 2 weeks ago
- ☆144Updated this week
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆56Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆283Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 2 years ago
- DPAPILAB Next Gen, script collection☆84Updated 2 years ago
- ☆47Updated 3 years ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆15Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆58Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 2 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆76Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆147Updated 7 months ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆43Updated this week
- A list of weird comparison in SQL☆15Updated 3 years ago
- Compile SharpHound and others on Linux☆24Updated 10 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 9 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆63Updated 3 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆202Updated 4 months ago
- C++ Reflective Assembly Loader☆27Updated 3 months ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- ☆177Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Updated 10 months ago