skelsec / pypykatz-volatility3View external linksLinks
pypykatz plugin for volatility3 framework
☆46May 30, 2025Updated 8 months ago
Alternatives and similar repositories for pypykatz-volatility3
Users that are interested in pypykatz-volatility3 are comparing it to the libraries listed below
Sorting:
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- named pipe server with impersonation☆60May 11, 2019Updated 6 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Python library for SPF, DKIM, and DMARC email protections.☆42May 28, 2018Updated 7 years ago
- Windows UAC bypass techniques implemented and written in Go☆216Mar 27, 2022Updated 3 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- A framework for exploiting padding oracles in network-based applications☆26Feb 25, 2023Updated 2 years ago
- ☆50Jun 28, 2022Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- A stager and implant that executes remote Web Assembly☆33Feb 4, 2026Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Fully asynchronous SMB library written in pure python☆218Jan 31, 2026Updated 2 weeks ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆18Jun 14, 2023Updated 2 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Embedded, small and composable Zero-Trust Teamserver made for collaborative Go programs or CLI applications.☆13Jul 10, 2025Updated 7 months ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 4 years ago
- Official implementation for the paper "On deceiving malware classification with section injection"☆36Aug 16, 2022Updated 3 years ago
- Implements io.ReaderAt over raw memory.☆13Jun 26, 2020Updated 5 years ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆15Feb 9, 2026Updated last week
- ☆18Feb 1, 2026Updated 2 weeks ago
- This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your …☆16Mar 24, 2021Updated 4 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- POCs to test Vlang in cybersecurity aspects.☆37Dec 29, 2022Updated 3 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆40Nov 16, 2025Updated 3 months ago