JPCERTCC / Windows-Symbol-TablesLinks
Windows symbol tables for Volatility 3
β91Updated last year
Alternatives and similar repositories for Windows-Symbol-Tables
Users that are interested in Windows-Symbol-Tables are comparing it to the libraries listed below
Sorting:
- RegRipper4.0β76Updated 3 weeks ago
- Volatility, on Docker π³β40Updated last month
- A small util to brute-force prefetch hashesβ77Updated 3 years ago
- Dump quarantined files from Windows Defenderβ73Updated 3 years ago
- Volatility3 plugins developed and maintained by the communityβ61Updated 2 years ago
- Volatility Symbol Generator for Linux Kernelsβ37Updated 2 years ago
- Elastic Security Labs releasesβ81Updated last month
- YARA rule analyzer to improve rule quality and performanceβ107Updated 8 months ago
- Cobalt Strike Beacon configuration extractor and parser.β157Updated 2 months ago
- JPCERT/CC public YARA rules repositoryβ110Updated last month
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIRβ252Updated 2 months ago
- Volatility3 Linux profilesβ70Updated 3 weeks ago
- LILO based Pulse Secure appliance disk image decryptorβ13Updated last year
- Parses amcache.hve files, but with a twist!β147Updated 11 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworjβ134Updated 2 years ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy accessβ¦β77Updated last week
- 100 Days of YARA to be updated with rules & ideas as the year progressesβ60Updated 2 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.β54Updated 2 months ago
- Volatility 3 Pluginsβ21Updated 3 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)β129Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profilesβ182Updated 6 months ago
- A guide on how to write fast and memory friendly YARA rulesβ161Updated 10 months ago
- Carve file metadata from NTFS index ($I30) attributesβ71Updated last year
- A C# based tool for analysing malicious OneNote documentsβ118Updated 2 years ago
- Use YARA rules on Time Travel Debugging tracesβ96Updated 2 years ago
- A ProcessMonitor visualization application written in rust.β183Updated 2 years ago
- Powershell Linterβ86Updated 3 weeks ago
- Initial triage of Windows Event logsβ105Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interactionβ85Updated 2 weeks ago