p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆50Updated 3 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 3☆30Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 10 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆101Updated 8 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆140Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆158Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 9 months ago
- Impacket is a collection of Python classes for working with network protocols.☆298Updated 4 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated last year
- SNMPv3 Authentication Bruteforcer☆37Updated 4 years ago
- A cross platform library to write offensive and defensive security tools in Go☆129Updated 2 weeks ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆101Updated 2 years ago
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 3 years ago
- ☆163Updated 5 months ago
- winPEAS, but for Active Directory☆167Updated 8 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 5 months ago
- ☆221Updated 6 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆157Updated 4 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆162Updated 7 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆228Updated 9 months ago
- Azure mindmap for penetration tests☆193Updated 2 years ago
- rcat☆72Updated 3 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆281Updated 2 years ago
- Lab used for workshop and CTF☆382Updated this week
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆268Updated 3 weeks ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆289Updated last month
- ☆100Updated 5 months ago
- ☆305Updated 8 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆62Updated 3 years ago