botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 11 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Various pentest scripts☆14Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- ☆25Updated 10 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- Wireshark regression tests☆11Updated 4 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- A scriptable debugger library to interact with Android applications☆46Updated 12 years ago
- ☆57Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- ☆22Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- Public resources NB shares☆18Updated 9 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 12 years ago