p0dalirius / volatility2docker
A volatility 2 docker for forensic investigations
☆18Updated last year
Alternatives and similar repositories for volatility2docker:
Users that are interested in volatility2docker are comparing it to the libraries listed below
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 9 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆14Updated last year
- A multithreaded bruteforcer of argon2 hashes.☆34Updated last year
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆12Updated 9 months ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆38Updated 6 months ago
- ☆38Updated last year
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆41Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆145Updated last month
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 3 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆15Updated 3 months ago
- VM Lab for security☆9Updated 10 months ago
- A Python script to extract the serial number of a remote Fortinet device.☆28Updated last year
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆39Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆23Updated last year
- A script to factorize integers with sagemath and factordb.☆11Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated 9 months ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Updated last year
- A script to enumerate valid usernames based on the requests response times.☆18Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆65Updated 4 months ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆38Updated 10 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆33Updated 3 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- ☆105Updated 2 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆16Updated 2 years ago