Volatility 3 Plugins
☆21Oct 3, 2022Updated 3 years ago
Alternatives and similar repositories for volatility_plugins
Users that are interested in volatility_plugins are comparing it to the libraries listed below
Sorting:
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated last year
- An Awesome, Feature Rich Discord Bot for Hosting and Managing CTF Challenges on Discord Written in Python3☆11Jun 29, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- ☆25Jul 23, 2024Updated last year
- The backend server handling API requests and task management☆55Updated this week
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆228Apr 28, 2024Updated last year
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 3 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Apr 9, 2024Updated last year
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- ☆36Jan 11, 2023Updated 3 years ago
- ☆34Nov 11, 2025Updated 3 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆177Dec 2, 2025Updated 2 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆43Mar 19, 2024Updated last year
- Scripts and things.☆13Jan 23, 2026Updated last month
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- ☆47Feb 14, 2026Updated 2 weeks ago
- volatility explorer☆92Nov 16, 2020Updated 5 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- Windows symbol tables for Volatility 3☆93Jul 11, 2024Updated last year
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- Reinforce good behaviour with a bark detector and deterrer☆11Jun 10, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆111Dec 28, 2022Updated 3 years ago