p0dalirius / volatility3-symbolsLinks
Memory mapping profiles for forensic analysis using volatility 3
☆27Updated 3 years ago
Alternatives and similar repositories for volatility3-symbols
Users that are interested in volatility3-symbols are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆129Updated 2 years ago
- ☆92Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆217Updated 2 years ago
- ☆185Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆142Updated 8 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆103Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated 10 months ago
- ☆147Updated last year
- ☆234Updated 2 years ago
- ☆178Updated 2 years ago
- DPAPILAB Next Gen, script collection☆90Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆78Updated last year
- ☆300Updated 10 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 5 months ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆359Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆317Updated 2 years ago
- Collection of my volatility3 plugins☆18Updated last year
- Exploit for the CVE-2023-23397☆161Updated 2 years ago
- Local & remote Windows DLL Proxying☆165Updated last year
- ☆159Updated 2 months ago
- PoCs of RCEs against open source C2 servers☆87Updated 11 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆90Updated 2 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- ☆136Updated last year
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆66Updated 3 years ago
- ☆161Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆141Updated last month
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆290Updated 2 weeks ago