Volatility Framework plugin to detect various types of hooks as performed by banking Trojans
☆40Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for volatility-browserhooks
Users that are interested in volatility-browserhooks are comparing it to the libraries listed below
Sorting:
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- threadmap plugin for Volatility Foundation☆27Aug 23, 2021Updated 4 years ago
- Google Chrome internals analysis using Volatility☆42Nov 17, 2022Updated 3 years ago
- A framework for writing and running regression tests for RetDec and related tools.☆24Feb 3, 2025Updated last year
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- C++ wrapper for YARA.☆45Jan 27, 2020Updated 6 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Development moved to https://github.com/mhsys/mh☆14Feb 20, 2018Updated 8 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆18Mar 29, 2016Updated 9 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Useful Scripts for helping in reverse engeenering☆181Sep 25, 2020Updated 5 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Parser for Windows Scheduled Task files.☆13Apr 26, 2023Updated 2 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Windows process injection methods☆19Aug 11, 2019Updated 6 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago