p0dalirius / volatility2-profilesLinks
Memory mapping profiles for forensic analysis using volatility 2
☆50Updated 3 years ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 3☆27Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 8 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆296Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- ☆201Updated 5 months ago
- A cross platform library to write offensive and defensive security tools in Go☆121Updated last month
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆62Updated last week
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆217Updated 8 months ago
- ☆213Updated 4 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆263Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 6 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆155Updated 11 months ago
- ☆160Updated 4 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆255Updated last week
- DPAPILAB Next Gen, script collection☆91Updated 3 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆218Updated last year
- winPEAS, but for Active Directory☆165Updated 6 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆61Updated 3 years ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆266Updated 11 months ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆96Updated 2 years ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 3 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆144Updated 9 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- Lab used for workshop and CTF☆281Updated 2 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆340Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆251Updated 8 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago