Abyss-W4tcher / volatility2-profiles
Collection of Volatility2 profiles, generated against Linux kernels.
β35Updated last week
Alternatives and similar repositories for volatility2-profiles:
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ95Updated last week
- Windows symbol tables for Volatility 3β81Updated 7 months ago
- Volatility3 Linux profilesβ32Updated last week
- A collection of tools and detections for the Sliver C2 Frameworjβ115Updated last year
- Collection of my volatility3 pluginsβ17Updated 5 months ago
- Volatility Symbol Generator for Linux Kernelsβ32Updated last year
- Volatility, on Docker π³β33Updated 7 months ago
- Generate Volatility3 profiles from BTF.β10Updated last month
- Memory mapping profiles for forensic analysis using volatility 2β46Updated 2 years ago
- Repository of Yara Rulesβ100Updated this week
- Configuration Extractors for Malwareβ91Updated 3 weeks ago
- Memory mapping profiles for forensic analysis using volatility 3β25Updated 2 years ago
- RegRipper4.0β44Updated last year
- Powershell Linterβ50Updated 2 weeks ago
- A ProcessMonitor visualization application written in rust.β178Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β172Updated 9 months ago
- Contains compiled binaries of Volatilityβ33Updated 3 weeks ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.β94Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated last year
- Dump quarantined files from Windows Defenderβ60Updated 2 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)β68Updated last year
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.β44Updated 2 years ago
- A specification and style guide for YARA rulesβ45Updated last year
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount theβ¦β38Updated 5 years ago
- PowerShell Script Analyzerβ67Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hosβ¦β30Updated 2 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32β11Updated 6 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β174Updated 3 weeks ago
- A small util to brute-force prefetch hashesβ76Updated 2 years ago
- Volatility 3 Pluginsβ19Updated 2 years ago