botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 11 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- ☆54Updated 12 years ago
- ☆36Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Release of the sandy framework.☆39Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- Encrypted Text Messaging☆148Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- XMLRPC server for password cracking☆33Updated 11 years ago
- Dragon Sandbox☆79Updated 12 years ago
- AFF is now being maintained at https://github.com/sshock/AFFLIBv3☆51Updated 11 years ago
- ☆12Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- Various pentest scripts☆14Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- autoscan - automatic fingerprint of visited networks☆11Updated 12 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- A scriptable debugger library to interact with Android applications☆46Updated 12 years ago
- ☆25Updated 10 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- ☆59Updated 11 years ago
- Wireshark regression tests☆11Updated 5 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago