JPCERTCC / Windows-Symbol-TablesLinks
Windows symbol tables for Volatility 3
β89Updated last year
Alternatives and similar repositories for Windows-Symbol-Tables
Users that are interested in Windows-Symbol-Tables are comparing it to the libraries listed below
Sorting:
- Volatility, on Docker π³β35Updated 2 weeks ago
- Elastic Security Labs releasesβ80Updated last month
- RegRipper4.0β62Updated 2 weeks ago
- Volatility3 plugins developed and maintained by the communityβ59Updated 2 years ago
- JPCERT/CC public YARA rules repositoryβ110Updated 8 months ago
- A small util to brute-force prefetch hashesβ78Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β83Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIRβ248Updated 5 months ago
- Linpmem is a linux memory acquisition toolβ87Updated 2 months ago
- YARA rule analyzer to improve rule quality and performanceβ103Updated 4 months ago
- Dump quarantined files from Windows Defenderβ65Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworjβ128Updated 2 years ago
- LILO based Pulse Secure appliance disk image decryptorβ13Updated last year
- A ProcessMonitor visualization application written in rust.β183Updated 2 years ago
- Volatility Symbol Generator for Linux Kernelsβ36Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β203Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progressesβ60Updated 2 years ago
- Powershell Linterβ80Updated last month
- Linux Evidence Acquisition Frameworkβ119Updated 11 months ago
- Repository of Yara Rulesβ115Updated 4 months ago
- Initial triage of Windows Event logsβ102Updated last year
- A C# based tool for analysing malicious OneNote documentsβ114Updated 2 years ago
- Parses amcache.hve files, but with a twist!β140Updated 7 months ago
- β141Updated last month
- Use YARA rules on Time Travel Debugging tracesβ92Updated 2 years ago
- Cobalt Strike Beacon configuration extractor and parser.β155Updated 4 years ago
- Lazarus analysis tools and research reportβ56Updated last year
- Collection of Volatility2 profiles, generated against Linux kernels.β48Updated last week
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.β136Updated last month
- yara detection rules for hunting with the threathunting-keywords projectβ127Updated 3 months ago