JPCERTCC / Windows-Symbol-TablesLinks
Windows symbol tables for Volatility 3
β89Updated last year
Alternatives and similar repositories for Windows-Symbol-Tables
Users that are interested in Windows-Symbol-Tables are comparing it to the libraries listed below
Sorting:
- RegRipper4.0β68Updated last month
- Volatility, on Docker π³β39Updated last week
- Volatility Symbol Generator for Linux Kernelsβ36Updated last year
- Volatility3 plugins developed and maintained by the communityβ59Updated 2 years ago
- JPCERT/CC public YARA rules repositoryβ110Updated 10 months ago
- Elastic Security Labs releasesβ81Updated this week
- Parses amcache.hve files, but with a twist!β142Updated 8 months ago
- Cobalt Strike Beacon configuration extractor and parser.β156Updated 4 years ago
- A small util to brute-force prefetch hashesβ78Updated 3 years ago
- Dump quarantined files from Windows Defenderβ67Updated 3 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.β53Updated last month
- YARA rule analyzer to improve rule quality and performanceβ103Updated 6 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIRβ248Updated 6 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progressesβ60Updated 2 years ago
- Initial triage of Windows Event logsβ102Updated last year
- LILO based Pulse Secure appliance disk image decryptorβ13Updated last year
- A guide on how to write fast and memory friendly YARA rulesβ152Updated 8 months ago
- Linux Evidence Acquisition Frameworkβ118Updated last year
- A C# based tool for analysing malicious OneNote documentsβ116Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.β113Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interactionβ80Updated this week
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β210Updated last year
- Volatility 3 Pluginsβ21Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated 2 years ago
- Use YARA rules on Time Travel Debugging tracesβ93Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworjβ130Updated 2 years ago
- Repository of Yara Rulesβ123Updated 3 weeks ago
- A ProcessMonitor visualization application written in rust.β184Updated 2 years ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy accessβ¦β73Updated last week
- Powershell Linterβ83Updated last week