This repo hosts an MCP server for volatility3.x
☆39Jul 9, 2025Updated 7 months ago
Alternatives and similar repositories for volatility-mcp
Users that are interested in volatility-mcp are comparing it to the libraries listed below
Sorting:
- ☆24Mar 12, 2025Updated 11 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Flash水坑修改版-添加操作系统判断,文件下载判断,exe base64编码进js内部无需302跳转伪造页面点击即可下载,js混淆☆14Nov 10, 2023Updated 2 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Parses the WMI object database....looking for persistence☆34Dec 12, 2019Updated 6 years ago
- ☆35Jan 27, 2025Updated last year
- Cobalt Strike二次开发笔记,记录功能和思路☆16Jul 9, 2022Updated 3 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- Windows Forensics Salt States☆21Feb 23, 2026Updated last week
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- ☆39Jul 1, 2025Updated 8 months ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- A series of python scripts to extract information from SQLite Data Files☆21Nov 15, 2025Updated 3 months ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 4 months ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- ☆27Nov 26, 2024Updated last year
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- A Model Context Protocol server that provides access to Shodan API functionality☆40Jun 29, 2025Updated 8 months ago
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 8 months ago
- An IDA plugin which demangles Rust function names☆35Dec 11, 2023Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Shellcode loader☆101Nov 24, 2024Updated last year
- ☆36Jan 11, 2023Updated 3 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago