JPCERTCC / Windows-Symbol-TablesLinks
Windows symbol tables for Volatility 3
β92Updated last year
Alternatives and similar repositories for Windows-Symbol-Tables
Users that are interested in Windows-Symbol-Tables are comparing it to the libraries listed below
Sorting:
- Volatility, on Docker π³β41Updated 2 months ago
- Volatility3 plugins developed and maintained by the communityβ62Updated 2 years ago
- RegRipper4.0β81Updated 2 months ago
- A small util to brute-force prefetch hashesβ77Updated 3 years ago
- JPCERT/CC public YARA rules repositoryβ110Updated 2 months ago
- Elastic Security Labs releasesβ84Updated 2 months ago
- YARA rule analyzer to improve rule quality and performanceβ110Updated 3 weeks ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIRβ252Updated 3 months ago
- Linux Evidence Acquisition Frameworkβ119Updated last year
- Volatility Symbol Generator for Linux Kernelsβ37Updated 2 years ago
- Cobalt Strike Beacon configuration extractor and parser.β160Updated 3 months ago
- Dump quarantined files from Windows Defenderβ73Updated 3 years ago
- Parses amcache.hve files, but with a twist!β149Updated last year
- Initial triage of Windows Event logsβ106Updated last year
- A guide on how to write fast and memory friendly YARA rulesβ164Updated 11 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated 2 years ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy accessβ¦β79Updated this week
- LILO based Pulse Secure appliance disk image decryptorβ13Updated last year
- A ProcessMonitor visualization application written in rust.β184Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progressesβ60Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworjβ133Updated 2 years ago
- A C# based tool for analysing malicious OneNote documentsβ118Updated 2 years ago
- β152Updated 3 months ago
- Collection of rules created using YARA-Signator over Malpediaβ142Updated last month
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)β133Updated 3 years ago
- Volatility 3 Pluginsβ21Updated 3 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β229Updated last year
- Yara Rules for Modern Malwareβ78Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.β146Updated last week
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profilesβ185Updated 7 months ago