botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 11 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Wireshark regression tests☆11Updated 4 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- ☆36Updated 10 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- A scriptable debugger library to interact with Android applications☆46Updated 12 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- Script to change all MAC Addresses☆12Updated 12 years ago
- Release of the sandy framework.☆39Updated 11 years ago
- ☆12Updated 8 years ago
- Various pentest scripts☆14Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- ☆25Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago