Abyss-W4tcher / volatility2-profilesLinks
Collection of Volatility2 profiles, generated against Linux kernels.
β53Updated last month
Alternatives and similar repositories for volatility2-profiles
Users that are interested in volatility2-profiles are comparing it to the libraries listed below
Sorting:
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ213Updated last month
- Volatility3 Linux profilesβ58Updated 3 weeks ago
- A curated list of ressources for Volatility 2 & 3β12Updated last year
- Windows symbol tables for Volatility 3β89Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β210Updated last year
- Collection of my volatility3 pluginsβ18Updated last year
- RegRipper4.0β68Updated last month
- Generate Volatility3 profiles from BTF.β29Updated 9 months ago
- Volatility Symbol Generator for Linux Kernelsβ36Updated last year
- Memory acquisition for Linux that makes sense.β206Updated last year
- Repository of Yara Rulesβ123Updated 3 weeks ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the funcβ¦β70Updated last month
- A collection of tools and detections for the Sliver C2 Frameworjβ130Updated 2 years ago
- A ProcessMonitor visualization application written in rust.β184Updated 2 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount theβ¦β52Updated 5 years ago
- Volatility, on Docker π³β39Updated last week
- Dump quarantined files from Windows Defenderβ67Updated 3 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files β¦β163Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thiβ¦β195Updated 3 weeks ago
- Powershell Linterβ83Updated last week
- Configuration Extractors for Malwareβ113Updated 5 months ago
- β113Updated 2 months ago
- Python tool to check rootkits in Windows kernelβ201Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.β219Updated 2 years ago
- Linpmem is a linux memory acquisition toolβ88Updated 3 months ago
- Memory mapping profiles for forensic analysis using volatility 3β27Updated 3 years ago
- Retrieve inner payloads from Donut samplesβ108Updated last year
- Volatility3 plugins developed and maintained by the communityβ59Updated 2 years ago
- β161Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandboxβ127Updated last month