botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 11 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- ☆37Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- ☆24Updated 10 years ago
- Network white noise collector☆19Updated 9 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 11 years ago
- ☆57Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Public resources NB shares☆18Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 11 years ago
- A scriptable debugger library to interact with Android applications☆46Updated 12 years ago
- Various pentest scripts☆14Updated 11 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Release of the sandy framework.☆39Updated 11 years ago
- See here:☆42Updated 12 years ago
- Some yara rules and tools☆16Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago