ZarKyo / awesome-volatilityLinks
A curated list of ressources for Volatility 2 & 3
☆13Updated last year
Alternatives and similar repositories for awesome-volatility
Users that are interested in awesome-volatility are comparing it to the libraries listed below
Sorting:
- Collection of Volatility2 profiles, generated against Linux kernels.☆54Updated last month
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆226Updated last year
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆244Updated 2 weeks ago
- Dump quarantined files from Windows Defender☆73Updated 3 years ago
- Repository of Yara Rules☆132Updated last week
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- RegRipper4.0☆74Updated last week
- Python tool to check rootkits in Windows kernel☆203Updated 4 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆200Updated 3 months ago
- Volatility3 Linux profiles☆70Updated last week
- DFIR project to collect and analyze events in Google Workspace☆13Updated last year
- Configuration Extractors for Malware☆121Updated 7 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆166Updated last year
- Volatility 3 Plugins☆21Updated 3 years ago
- CAPE core and community parsers☆17Updated last week
- A collection of tools and detections for the Sliver C2 Frameworj☆133Updated 2 years ago
- Memory acquisition for Linux that makes sense.☆215Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆141Updated last week
- A collection of tools, scripts and personal research☆154Updated last week
- Powershell Linter☆86Updated last week
- A specification and style guide for YARA rules☆63Updated last year
- ☆258Updated last year
- ☆211Updated 2 weeks ago
- Windows symbol tables for Volatility 3☆91Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- ☆247Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 11 months ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆480Updated 4 months ago
- Generate Volatility3 profiles from BTF.☆30Updated last year