p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆50Updated 2 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 3☆27Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 4 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 6 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 9 months ago
- Impacket is a collection of Python classes for working with network protocols.☆291Updated 2 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 5 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆149Updated 8 months ago
- winPEAS, but for Active Directory☆154Updated 4 months ago
- ☆96Updated last month
- ☆150Updated last month
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 11 months ago
- Docker images of the Exegol project☆111Updated this week
- Lab used for workshop and CTF☆259Updated 2 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆56Updated last month
- ☆189Updated 2 months ago
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 2 years ago
- A cross platform library to write offensive and defensive security tools in Go☆110Updated last week
- Azure mindmap for penetration tests☆188Updated last year
- A webshell plugin and interactive shell for pentesting a WordPress website.☆91Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆206Updated 5 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆211Updated 10 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆279Updated 2 years ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆262Updated 8 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated last month
- DPAPI looting remotely and locally in Python☆495Updated 2 months ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆314Updated 8 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆228Updated 3 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆77Updated last year