Volatility 3 Plugins
☆21Oct 3, 2022Updated 3 years ago
Alternatives and similar repositories for volatility_plugins
Users that are interested in volatility_plugins are comparing it to the libraries listed below
Sorting:
- An Awesome, Feature Rich Discord Bot for Hosting and Managing CTF Challenges on Discord Written in Python3☆11Jun 29, 2024Updated last year
- ☆19Oct 23, 2020Updated 5 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- volatility explorer☆92Nov 16, 2020Updated 5 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- ☆18Mar 26, 2024Updated last year
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆273Updated this week
- Memory mapping profiles for forensic analysis using volatility 2☆53Sep 23, 2022Updated 3 years ago
- ☆25Jul 23, 2024Updated last year
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- Reinforce good behaviour with a bark detector and deterrer☆11Jun 10, 2020Updated 5 years ago
- Windows symbol tables for Volatility 3☆93Jul 11, 2024Updated last year
- The backend server handling API requests and task management☆59Updated this week
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆113Dec 28, 2022Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 3 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆172Jul 20, 2024Updated last year
- most powerful batch obfuscator☆47Jan 2, 2023Updated 3 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆55Oct 30, 2025Updated 4 months ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- ☆36Jan 11, 2023Updated 3 years ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 2 years ago
- ☆39Aug 8, 2024Updated last year
- OWASP Foundation Web Respository☆15Oct 9, 2025Updated 5 months ago
- A python library for generating different permutations of audible segments from audio files.☆13Jun 13, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Volatility3 plugins developed and maintained by the community☆63Mar 19, 2023Updated 3 years ago