JPCERTCC / Windows-Symbol-TablesLinks
Windows symbol tables for Volatility 3
β92Updated last year
Alternatives and similar repositories for Windows-Symbol-Tables
Users that are interested in Windows-Symbol-Tables are comparing it to the libraries listed below
Sorting:
- RegRipper4.0β79Updated last month
- Volatility, on Docker π³β41Updated 2 months ago
- Volatility Symbol Generator for Linux Kernelsβ37Updated 2 years ago
- Volatility3 plugins developed and maintained by the communityβ61Updated 2 years ago
- Elastic Security Labs releasesβ84Updated last month
- JPCERT/CC public YARA rules repositoryβ110Updated 2 months ago
- YARA rule analyzer to improve rule quality and performanceβ109Updated this week
- Dump quarantined files from Windows Defenderβ73Updated 3 years ago
- A small util to brute-force prefetch hashesβ77Updated 3 years ago
- Volatility3 Linux profilesβ72Updated last month
- Collection of Volatility2 profiles, generated against Linux kernels.β54Updated 2 months ago
- Parses amcache.hve files, but with a twist!β147Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIRβ250Updated 2 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progressesβ60Updated 3 years ago
- Cobalt Strike Beacon configuration extractor and parser.β158Updated 2 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy accessβ¦β78Updated this week
- Initial triage of Windows Event logsβ105Updated last year
- Volatility 3 Pluginsβ21Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rulesβ162Updated 11 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated 2 years ago
- Lazarus analysis tools and research reportβ57Updated 2 years ago
- Yara Rules for Modern Malwareβ78Updated last year
- A specification and style guide for YARA rulesβ64Updated last year
- β21Updated last year
- A C# based tool for analysing malicious OneNote documentsβ118Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworjβ133Updated 2 years ago
- LILO based Pulse Secure appliance disk image decryptorβ13Updated last year
- ShellSweeping the evil.β53Updated last year
- Linux Evidence Acquisition Frameworkβ117Updated last year
- Repository of Yara Rulesβ138Updated this week