botherder / volatility
An advanced memory forensics framework
☆25Updated 10 years ago
Alternatives and similar repositories for volatility:
Users that are interested in volatility are comparing it to the libraries listed below
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- See here:☆42Updated 12 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Script for searching the extracted firmware file system for goodies!☆9Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆12Updated 8 years ago
- File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native…☆22Updated 8 months ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆35Updated 10 years ago
- ☆24Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- Some yara rules and tools☆16Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago