botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 11 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- ☆36Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- EFF's Tracker Blocking Laboratory is an experimental project to test heuristic blocking of non-consensual online tracking. It's based on …☆11Updated 12 years ago
- AFF is now being maintained at https://github.com/sshock/AFFLIBv3☆52Updated 11 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Encrypted Text Messaging☆148Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- ☆57Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- ☆24Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 8 months ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Generic binary file parser☆59Updated 10 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- ☆16Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Network white noise collector☆19Updated 9 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- lte security☆41Updated 9 years ago
- ☆12Updated 8 years ago