Immersive-Labs-Sec / volatility_plugins
Volatility 3 Plugins
☆19Updated last year
Related projects: ⓘ
- Yara Rules for Modern Malware☆68Updated 6 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆57Updated last year
- ☆20Updated 2 years ago
- ☆34Updated last year
- ☆35Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆80Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated 11 months ago
- YARA rule analyzer to improve rule quality and performance☆93Updated 9 months ago
- An exercise to practice deobfuscating PowerShell Scripts.☆27Updated last year
- USN Journal full path builder☆36Updated this week
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆66Updated 10 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 5 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2 & some of SuperFetch .7db/.db's☆39Updated 7 months ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆47Updated last year
- Living off the False Positive!☆27Updated 3 weeks ago
- A C# based tool for analysing malicious OneNote documents☆108Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆33Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆29Updated 2 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆34Updated last year
- ShellSweeping the evil.☆49Updated 3 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- ☆35Updated this week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆64Updated 3 weeks ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆11Updated 3 months ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆15Updated 2 years ago