Run several volatility plugins at the same time
☆118Oct 27, 2022Updated 3 years ago
Alternatives and similar repositories for autoVolatility
Users that are interested in autoVolatility are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- System based on +500 blacklists to detect internet potencialy malicious hosts☆154Updated this week
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- ☆152Jun 5, 2024Updated last year
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- Collection of my volatility3 plugins☆18Sep 6, 2024Updated last year
- Plugins I've written for Volatility☆216Dec 1, 2023Updated 2 years ago
- Docker build for autopsy☆22Apr 13, 2021Updated 4 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆648Nov 7, 2025Updated 4 months ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Automagically extract forensic timeline from volatile memory dump☆133Mar 5, 2026Updated 2 weeks ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Parse CTFd scoreboard into CTFtime JSON format.☆13Dec 1, 2025Updated 3 months ago
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- ☆33Nov 21, 2024Updated last year
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 8 months ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆53Oct 29, 2025Updated 4 months ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆701Oct 22, 2025Updated 5 months ago
- ☆16Apr 24, 2023Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- The Volatility Collaborative GUI☆264Feb 11, 2026Updated last month
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆95Feb 19, 2026Updated last month
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- ☆171Feb 27, 2026Updated 3 weeks ago
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- Access All Networks: an offensive multitool against 802.1X☆20Aug 25, 2025Updated 6 months ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆663Jan 25, 2026Updated last month