p0dalirius / volatility3-symbolsLinks
Memory mapping profiles for forensic analysis using volatility 3
☆30Updated 3 years ago
Alternatives and similar repositories for volatility3-symbols
Users that are interested in volatility3-symbols are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 2☆51Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆134Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆223Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- ☆90Updated 2 years ago
- ☆302Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆140Updated last year
- Volatility, on Docker 🐳☆40Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆279Updated 2 years ago
- ☆163Updated 6 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆166Updated last year
- DPAPILAB Next Gen, script collection☆92Updated 3 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 4 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- ☆228Updated 6 months ago
- PoCs of RCEs against open source C2 servers☆88Updated last year
- ☆121Updated last year
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆54Updated 5 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Updated 2 years ago
- ☆184Updated 3 years ago
- Tools for analyzing EDR agents☆273Updated last year
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- Local & remote Windows DLL Proxying☆169Updated last year
- ☆330Updated 4 months ago
- ☆192Updated last year
- Collection of Volatility2 profiles, generated against Linux kernels.☆54Updated last month
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆257Updated last year