Dutchy- / volatility-pluginsLinks
Container for assorted volatility plugins.
☆23Updated 11 years ago
Alternatives and similar repositories for volatility-plugins
Users that are interested in volatility-plugins are comparing it to the libraries listed below
Sorting:
- A collection of Volatility Framework plugins.☆27Updated 11 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Command-line Interface for Binar.ly☆38Updated 8 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 8 years ago
- ☆68Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- egrets monitors egress☆46Updated 5 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- Extract GUIDs from .NET assemblies☆21Updated 9 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- first commit☆20Updated last year
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- Volatility Plugins☆21Updated 10 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Torified Cuckoo malware analyser in a Docker container with VirtualBox☆2Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago