botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 11 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- A scriptable debugger library to interact with Android applications☆46Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Various pentest scripts☆14Updated 11 years ago
- Release of the sandy framework.☆39Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- Teensy code to brute force a keylogger's unlock code☆15Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- Public resources NB shares☆18Updated 9 years ago
- ☆25Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- ☆12Updated 9 years ago
- ☆36Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- stuff from my ToorCon 2015 talk☆15Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago