Linpmem is a linux memory acquisition tool
☆104Jun 22, 2025Updated 10 months ago
Alternatives and similar repositories for Linpmem
Users that are interested in Linpmem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The multi-platform memory acquisition tool.☆970Oct 14, 2025Updated 6 months ago
- ☆24Apr 22, 2025Updated last year
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- A library to parse macOS FsEvents☆25Aug 28, 2022Updated 3 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆292Apr 14, 2026Updated 2 weeks ago
- Advanced Network Interface Management and Monitoring☆34Jan 6, 2024Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Memory acquisition for Linux that makes sense.☆231Nov 21, 2023Updated 2 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆53Jan 9, 2026Updated 3 months ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- ☆11Mar 14, 2019Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- ☆21Jan 28, 2026Updated 3 months ago
- ☆20Apr 10, 2025Updated last year
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆94Sep 7, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,314Apr 16, 2026Updated 2 weeks ago
- Incident Response collection and processing scripts with automated reporting scripts☆327Jun 25, 2024Updated last year
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆256Oct 29, 2025Updated 6 months ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- Get some useful data from Clouds for your targets☆20Apr 19, 2026Updated last week
- Powershell script to help Speed up Threat hunting incident response processes☆43Mar 31, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Jan 31, 2024Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- Volatility3 plugins developed and maintained by the community☆66Mar 19, 2023Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago