breppo / Volatility-BitLocker
Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the volume.
☆44Updated 5 years ago
Alternatives and similar repositories for Volatility-BitLocker:
Users that are interested in Volatility-BitLocker are comparing it to the libraries listed below
- Windows symbol tables for Volatility 3☆83Updated 9 months ago
- Volatility3 plugins developed and maintained by the community☆51Updated 2 years ago
- volatility explorer☆91Updated 4 years ago
- Linpmem is a linux memory acquisition tool☆82Updated 11 months ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆208Updated last year
- RegRipper4.0☆46Updated last year
- A small util to brute-force prefetch hashes☆76Updated 2 years ago
- Powershell Linter☆50Updated 3 weeks ago
- A collection of tools and detections for the Sliver C2 Frameworj☆123Updated 2 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆65Updated 3 years ago
- Volatility Symbol Generator for Linux Kernels☆34Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆237Updated 3 weeks ago
- Yara Rules for Modern Malware☆77Updated last year
- DPAPILAB Next Gen, script collection☆82Updated 2 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆256Updated last year
- Finding secrets in kernel and user memory☆115Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆180Updated 11 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆40Updated 7 months ago
- ☆72Updated 3 years ago
- ☆18Updated 2 years ago
- Use YARA rules on Time Travel Debugging traces☆89Updated last year
- ☆54Updated 6 months ago
- Memory mapping profiles for forensic analysis using volatility 3☆26Updated 3 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆76Updated 8 months ago
- Dump quarantined files from Windows Defender☆62Updated 3 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆38Updated 3 weeks ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆142Updated 9 months ago