Gaffx / volatility-mcpLinks
This repo hosts an MCP server for volatility3.x
☆38Updated 7 months ago
Alternatives and similar repositories for volatility-mcp
Users that are interested in volatility-mcp are comparing it to the libraries listed below
Sorting:
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆34Updated last month
- A YARA rule generator☆61Updated this week
- A YARA & Malware Analysis Toolkit written in Rust.☆92Updated this week
- Purple-team telemetry & simulation toolkit.☆107Updated last month
- Detonate malware on VMs and get logs & detection status☆76Updated 2 weeks ago
- MSIX Building Made Easy for Defenders☆59Updated 5 months ago
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆107Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 5 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24Updated 2 years ago
- This is a repository to experiment with MCP for security☆47Updated last year
- ☆59Updated 2 months ago
- Living off the False Positive!☆41Updated last year
- Baseline a Windows System against LOLBAS☆70Updated last week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆148Updated this week
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 11 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆64Updated this week
- AI-based implant feature☆25Updated 9 months ago
- VTC - Velociraptor Timeline Creator☆19Updated last year
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Updated last month
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Updated last month
- ☆82Updated 5 months ago