p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆49Updated 2 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 5 months ago
- Memory mapping profiles for forensic analysis using volatility 3☆27Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 3 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 8 months ago
- Impacket is a collection of Python classes for working with network protocols.☆284Updated 6 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆148Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆152Updated 5 months ago
- A cross platform library to write offensive and defensive security tools in Go☆105Updated 2 weeks ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 10 months ago
- Lab used for workshop and CTF☆254Updated last month
- ☆95Updated 3 weeks ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- ☆185Updated last month
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆54Updated 2 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementation☆204Updated 5 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 2 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆179Updated 3 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆314Updated 8 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 2 weeks ago
- ☆148Updated 3 weeks ago
- winPEAS, but for Active Directory☆153Updated 3 months ago
- A delicious, but malicious SSL-VPN server 🌮☆236Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆232Updated 4 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated 9 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆77Updated last year
- Web interface to explore Suricata EVE outputs☆60Updated 7 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆279Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆142Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆57Updated 2 weeks ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆256Updated 11 months ago