tijldeneut / DPAPIck3Links
☆19Updated last week
Alternatives and similar repositories for DPAPIck3
Users that are interested in DPAPIck3 are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆51Updated 8 months ago
- PowerShell PE Parser☆63Updated last year
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- Diana Credential Recovery Framework☆60Updated 2 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 8 months ago
- Quick and dirty PoSH code to read teams messages☆22Updated 7 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 6 months ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆28Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Keep it secret, keep it safe☆78Updated 7 months ago
- ☆48Updated last year
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆37Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated 11 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆63Updated 8 months ago
- ☆93Updated 3 years ago
- Repository of Volatility3 plugins☆22Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago
- ☆39Updated last year
- A collection of my presentation materials.☆17Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year
- Windows.EDB Browser☆57Updated 2 years ago
- ☆45Updated last year
- Dump objects from .NET dumps.☆51Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆20Updated 3 years ago