tribalchicken / volatility-filevault2View external linksLinks
Volatility plugin to extract FileVault 2 VMK's
☆51Sep 20, 2021Updated 4 years ago
Alternatives and similar repositories for volatility-filevault2
Users that are interested in volatility-filevault2 are comparing it to the libraries listed below
Sorting:
- Whitepaper on Munki for Mac Management☆13Jun 3, 2016Updated 9 years ago
- ☆17Oct 27, 2017Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 2 years ago
- Very basic script that compares a an Apple pkg with what's on disk☆17Mar 6, 2018Updated 7 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Sep 20, 2021Updated 4 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆242May 16, 2016Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Public AutoPkg CI with Jenkins.☆14Jun 19, 2016Updated 9 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 12 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 2 months ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 11 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 10 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated last month
- Automatically exported from code.google.com/p/mac-osx-forensics☆28Jan 12, 2016Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago