Abyss-W4tcher / volatility2-profilesLinks
Collection of Volatility2 profiles, generated against Linux kernels.
β53Updated 2 months ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ221Updated last week
- Volatility3 Linux profilesβ59Updated last month
- A curated list of ressources for Volatility 2 & 3β12Updated last year
- Windows symbol tables for Volatility 3β91Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β216Updated last year
- Collection of my volatility3 pluginsβ18Updated last year
- Generate Volatility3 profiles from BTF.β29Updated 10 months ago
- Repository of Yara Rulesβ123Updated last month
- RegRipper4.0β72Updated 2 months ago
- Memory acquisition for Linux that makes sense.β211Updated last year
- Python tool to check rootkits in Windows kernelβ201Updated 2 months ago
- Volatility Symbol Generator for Linux Kernelsβ36Updated last year
- A collection of tools and detections for the Sliver C2 Frameworjβ131Updated 2 years ago
- β114Updated 3 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the funcβ¦β72Updated 2 months ago
- A ProcessMonitor visualization application written in rust.β184Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files β¦β165Updated last year
- Configuration Extractors for Malwareβ117Updated 6 months ago
- Powershell Linterβ84Updated last week
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount theβ¦β52Updated 5 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thiβ¦β198Updated last month
- Volatility, on Docker π³β39Updated last week
- ELFEN: Automated Linux Malware Analysis Sandboxβ129Updated 2 months ago
- Dump quarantined files from Windows Defenderβ67Updated 3 years ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β371Updated 2 months ago
- Retrieve inner payloads from Donut samplesβ110Updated last year
- A centralized and enhanced memory analysis platformβ505Updated 3 months ago
- Memory mapping profiles for forensic analysis using volatility 3β28Updated 3 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.β220Updated 2 years ago
- Linpmem is a linux memory acquisition toolβ94Updated 4 months ago