Utilities for the memory forensics framework
☆22Jul 31, 2018Updated 7 years ago
Alternatives and similar repositories for Volatility
Users that are interested in Volatility are comparing it to the libraries listed below
Sorting:
- volatility☆21Nov 16, 2014Updated 11 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- Load GC/Wii DOL in IDA (python)☆10Aug 7, 2018Updated 7 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Attempt of implementation of Hypervisor.Framework accelerator for QEMU (Dropped)☆18May 1, 2017Updated 8 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Feb 19, 2019Updated 7 years ago
- Mac osx forensics tools☆12Nov 28, 2020Updated 5 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- netactuator is an active network management tool, for graphing individual host activities and make individual host behavior patterns.☆16Jul 17, 2011Updated 14 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- This is a place for all things OSINT & Bookmarklets!☆17Jul 21, 2021Updated 4 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 5 months ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- ☆24Nov 3, 2019Updated 6 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 2 months ago
- Web interface for the Volatility Memory Forensics Framework☆259Nov 21, 2017Updated 8 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Apr 14, 2021Updated 4 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- A UI for docker-machine☆13Jan 27, 2017Updated 9 years ago
- Arduino library for the Nuit du Hack 2015 Badge☆13Jul 2, 2016Updated 9 years ago
- Native BOINC client for android and boinc applications☆39Feb 10, 2015Updated 11 years ago
- Writeups for CTF challenges☆35Mar 9, 2026Updated last week
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆33Apr 20, 2012Updated 13 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago