A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.
☆47Jun 5, 2022Updated 3 years ago
Alternatives and similar repositories for Vol-GUI
Users that are interested in Vol-GUI are comparing it to the libraries listed below
Sorting:
- ☆11Jun 20, 2021Updated 4 years ago
- android-sms2csv.py extract SMS messages from Android backup files☆13Jun 19, 2020Updated 5 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆18Aug 2, 2023Updated 2 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- dotfiles☆19Feb 18, 2025Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- ☆24Nov 3, 2019Updated 6 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- USN to JSON☆22Apr 4, 2020Updated 5 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- A Repositories of malicious code (ONLY FOR EDUCATIONAL PURPOSE)☆23Jan 21, 2022Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- git clone all repositories and gists from a given GitHub username☆32Nov 15, 2025Updated 3 months ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- ☆34Mar 29, 2021Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Extract APFS hashes☆38Jun 16, 2020Updated 5 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- cheap and terrible voltage glitcher hardware/software☆42Jan 1, 2020Updated 6 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Nov 21, 2021Updated 4 years ago