p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆53Updated 3 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 3☆31Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆142Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆163Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆303Updated 3 weeks ago
- ☆235Updated 8 months ago
- A cross platform library to write offensive and defensive security tools in Go☆130Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated last year
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- ☆166Updated 7 months ago
- Detect common NFS server misconfigurations☆96Updated last week
- DPAPILAB Next Gen, script collection☆94Updated 3 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 9 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆235Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- ☆230Updated 8 months ago
- winPEAS, but for Active Directory☆171Updated 10 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆357Updated last month
- Execute commands interactively on remote Windows machines using the WinRM protocol☆323Updated 2 weeks ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆260Updated 11 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 7 months ago
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 3 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆62Updated 7 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆291Updated this week
- rcat☆75Updated 3 years ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Updated last month
- A small utility to translate NTDS.dit files to SQLite format.☆82Updated 2 years ago