Abyss-W4tcher / volatility2-profilesLinks
Collection of Volatility2 profiles, generated against Linux kernels.
β54Updated 2 months ago
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Volatility3 Linux profilesβ70Updated 3 weeks ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ246Updated 3 weeks ago
- A curated list of ressources for Volatility 2 & 3β13Updated last year
- Collection of my volatility3 pluginsβ18Updated last year
- Windows symbol tables for Volatility 3β91Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β226Updated last year
- RegRipper4.0β76Updated 3 weeks ago
- Generate Volatility3 profiles from BTF.β30Updated last year
- A collection of tools and detections for the Sliver C2 Frameworjβ134Updated 2 years ago
- Volatility Symbol Generator for Linux Kernelsβ37Updated 2 years ago
- Dump quarantined files from Windows Defenderβ73Updated 3 years ago
- Memory mapping profiles for forensic analysis using volatility 3β30Updated 3 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the funcβ¦β74Updated 4 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files β¦β167Updated last year
- Memory acquisition for Linux that makes sense.β215Updated 2 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thiβ¦β200Updated 3 months ago
- Repository of Yara Rulesβ132Updated 3 weeks ago
- Python tool to check rootkits in Windows kernelβ204Updated 4 months ago
- A ProcessMonitor visualization application written in rust.β183Updated 2 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount theβ¦β54Updated 5 years ago
- β121Updated this week
- Powershell Linterβ86Updated 3 weeks ago
- Configuration Extractors for Malwareβ121Updated 8 months ago
- Volatility, on Docker π³β40Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.β224Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIRβ692Updated 2 months ago
- FLARE Team's Binary Navigatorβ297Updated 2 weeks ago
- Linpmem is a linux memory acquisition toolβ95Updated 6 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)β153Updated 4 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β397Updated last month