Learning volatility plugins.
☆19Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for volatility-plugins
Users that are interested in volatility-plugins are comparing it to the libraries listed below
Sorting:
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- git clone all repositories and gists from a given GitHub username☆32Nov 15, 2025Updated 3 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Apr 8, 2024Updated last year
- Parse Microsoft shim databases☆32Jan 8, 2025Updated last year
- Page File analysis tools.☆131Dec 3, 2015Updated 10 years ago
- Run several volatility plugins at the same time☆118Oct 27, 2022Updated 3 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- High performance search for IP addresses and CIDR ranges☆34Feb 4, 2026Updated 3 weeks ago
- Volatility Plugins☆64Jul 22, 2023Updated 2 years ago
- Parses the WMI object database....looking for persistence☆34Dec 12, 2019Updated 6 years ago
- Plugins I've written for Volatility☆216Dec 1, 2023Updated 2 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- volatility explorer☆92Nov 16, 2020Updated 5 years ago
- ☆41Apr 5, 2025Updated 10 months ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆38Aug 27, 2021Updated 4 years ago
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago