Kirandawadi / volatility3-mcpLinks
Volatility3 MCP Server for automating Memory Forensics
☆13Updated 5 months ago
Alternatives and similar repositories for volatility3-mcp
Users that are interested in volatility3-mcp are comparing it to the libraries listed below
Sorting:
- kernel callback removal (Bypassing EDR Detections)☆206Updated last month
- A living guide to lesser-known and evasive Windows API abuses used in malware, with practical reverse engineering notes, YARA detections,…☆87Updated last month
- Source code for complete MALicious softWARE books I & II☆62Updated 2 months ago
- ☆17Updated 3 months ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆22Updated 9 months ago
- ☆386Updated 6 months ago
- Collect Windows telemetry for Maldev☆445Updated last month
- Injecting DLL into LSASS at boot☆155Updated 7 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆257Updated 3 months ago
- early cascade injection PoC based on Outflanks blog post☆234Updated last year
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆574Updated 3 months ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆28Updated 2 months ago
- ☆123Updated last week
- RunPE implementation with multiple evasive techniques☆253Updated 2 months ago
- PoC framework for Sliver compilation☆23Updated 11 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆206Updated 3 months ago
- ☆164Updated 9 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆264Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆106Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆133Updated 4 months ago
- AV/EDR Lab environment setup references to help in Malware development☆418Updated 10 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆134Updated 6 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆334Updated last year
- Direct access to NTFS volumes☆291Updated 3 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆198Updated 3 months ago
- Process Injection using Thread Name☆284Updated 8 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated 11 months ago
- Obex – Blocking unwanted DLLs in user mode☆276Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆275Updated last year
- Code execution/injection technique using DLL PEB module structure manipulation☆217Updated 6 months ago