p0dalirius / volatility3-symbolsLinks
Memory mapping profiles for forensic analysis using volatility 3
☆30Updated 3 years ago
Alternatives and similar repositories for volatility3-symbols
Users that are interested in volatility3-symbols are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆132Updated 2 years ago
- ☆90Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆223Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated last year
- ☆163Updated 5 months ago
- ☆184Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- ☆234Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 3 months ago
- ☆301Updated last year
- Collection of Volatility2 profiles, generated against Linux kernels.☆53Updated 3 weeks ago
- ☆192Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- ☆328Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆179Updated 6 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆281Updated 2 years ago
- Collection of my volatility3 plugins☆18Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- DPAPILAB Next Gen, script collection☆92Updated 3 years ago
- Tools for analyzing EDR agents☆269Updated last year
- ☆328Updated 2 months ago
- Detect WFP filters blocking EDR communications☆94Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Updated 2 years ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- ☆120Updated last year