ShaneK2 / inVtero.net
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
☆278Updated last year
Related projects ⓘ
Alternatives and complementary repositories for inVtero.net
- C++ application that uses memory and code hooks to detect packers☆268Updated 6 years ago
- rVMI - A New Paradigm For Full System Analysis☆351Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆288Updated 3 months ago
- ATrace is a tool for tracing execution of binaries on Windows.☆235Updated 8 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆263Updated 3 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆192Updated 7 years ago
- Useful Scripts for helping in reverse engeenering☆182Updated 4 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 4 years ago
- BASS - BASS Automated Signature Synthesizer☆173Updated 6 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆148Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Various snippets created during malware analysis☆457Updated last year
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆161Updated last year
- PyAna - Analyzing the Windows shellcode☆247Updated 8 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆227Updated 9 months ago
- ☆110Updated 7 years ago
- Conference slides and White-papers☆356Updated 4 years ago
- ☆134Updated 5 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆278Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆311Updated 6 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 6 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆85Updated 7 years ago
- Decept Network Protocol Proxy☆276Updated last year
- snake - a malware storage zoo☆217Updated last year
- Protocol Analysis/Decoder Framework☆489Updated last year
- Python script to decode common encoded PowerShell scripts☆215Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆226Updated 8 years ago