p0dalirius / volatility3-symbolsLinks
Memory mapping profiles for forensic analysis using volatility 3
☆27Updated 3 years ago
Alternatives and similar repositories for volatility3-symbols
Users that are interested in volatility3-symbols are comparing it to the libraries listed below
Sorting:
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 3 years ago
- ☆90Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆130Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆219Updated 2 years ago
- ☆185Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 8 months ago
- ☆148Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆199Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆103Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- ☆233Updated 2 years ago
- Tools for analyzing EDR agents☆264Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆90Updated 3 months ago
- PoCs of RCEs against open source C2 servers☆87Updated last year
- Retrieve inner payloads from Donut samples☆108Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆78Updated 2 years ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆50Updated 8 months ago
- ☆300Updated 11 months ago
- ☆137Updated last year
- DPAPILAB Next Gen, script collection☆89Updated 3 years ago
- ☆179Updated 2 years ago
- ☆160Updated 2 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆291Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆280Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆189Updated 8 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆141Updated 2 months ago
- A cross platform library to write offensive and defensive security tools in Go☆122Updated last month
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated 11 months ago
- ☆287Updated 2 years ago