p0dalirius / volatility3-symbolsLinks
Memory mapping profiles for forensic analysis using volatility 3
☆27Updated 3 years ago
Alternatives and similar repositories for volatility3-symbols
Users that are interested in volatility3-symbols are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- ☆92Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆128Updated 2 years ago
- ☆185Updated 2 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆89Updated last month
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆51Updated 5 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 6 months ago
- DPAPILAB Next Gen, script collection☆87Updated 2 years ago
- ☆234Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆214Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆104Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 9 months ago
- ☆147Updated last year
- ☆162Updated 2 years ago
- PoCs of RCEs against open source C2 servers☆86Updated 10 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆134Updated this week
- A small utility to translate NTDS.dit files to SQLite format.☆77Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆45Updated 3 years ago
- ☆136Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆345Updated 2 years ago
- Pre-Auth Exploit for CVE-2024-40711☆54Updated 10 months ago
- To audit the security of read-only domain controllers☆117Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆151Updated last month
- Finding secrets in kernel and user memory☆116Updated last year
- Exploit for the CVE-2023-23397☆161Updated 2 years ago
- Collection of my volatility3 plugins☆18Updated 11 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆50Updated 6 months ago