botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 10 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Unlock Linux security module such as TOMOYO, MIYABI, FJSEC, KCLSM and so on.☆18Updated 11 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- ☆37Updated 10 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- A curated list of tools for incident response☆29Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Script for searching the extracted firmware file system for goodies!☆9Updated 9 years ago
- File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native…☆22Updated 10 months ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- See here:☆42Updated 12 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆10Updated 9 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- AFF is now being maintained at https://github.com/sshock/AFFLIBv3☆51Updated 10 years ago
- various exploits☆31Updated 13 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- ☆12Updated 8 years ago
- You'll never take me alive.☆86Updated 11 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago