Linpmem is a linux memory acquisition tool
☆95Jun 22, 2025Updated 8 months ago
Alternatives and similar repositories for Linpmem
Users that are interested in Linpmem are comparing it to the libraries listed below
Sorting:
- The multi-platform memory acquisition tool.☆946Oct 14, 2025Updated 4 months ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆51Jan 9, 2026Updated last month
- ☆13Mar 1, 2024Updated 2 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- ☆11Mar 14, 2019Updated 6 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated 11 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- ☆56Dec 13, 2024Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- My slide for PyCon China 2019.☆13Oct 29, 2019Updated 6 years ago
- ☆24Apr 22, 2025Updated 10 months ago
- ☆18Jan 21, 2026Updated last month
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆266Jan 20, 2026Updated last month
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆253Oct 29, 2025Updated 4 months ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- ☆14Oct 25, 2022Updated 3 years ago