My Linux profiles built for Volatility 2/3
☆10Oct 11, 2025Updated 4 months ago
Alternatives and similar repositories for volatility-profiles
Users that are interested in volatility-profiles are comparing it to the libraries listed below
Sorting:
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated last year
- ☆25Jul 23, 2024Updated last year
- Windows symbol tables for Volatility 3☆93Jul 11, 2024Updated last year
- Generate Volatility3 profiles from BTF.☆31Dec 21, 2024Updated last year
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Volatility Symbol Generator for Linux Kernels☆37Nov 15, 2023Updated 2 years ago
- Context Hub Runtime Environment (CHRE)☆10Oct 17, 2023Updated 2 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 9 months ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- Webpage segmentation use DBSCAN☆13Apr 4, 2023Updated 2 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- 🧞♂️ malware analysis☆38Mar 3, 2024Updated 2 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆112Dec 28, 2022Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Launcher application for Google Chrome's flatpak on Endless OS☆11Updated this week
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 5 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Google Chrome internals analysis using Volatility☆42Nov 17, 2022Updated 3 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Implement MTCNN with Tensorflow.js. A face detection framework with MTCNN and Tensorflow.js☆11Jun 30, 2022Updated 3 years ago
- An Awesome, Feature Rich Discord Bot for Hosting and Managing CTF Challenges on Discord Written in Python3☆11Jun 29, 2024Updated last year
- A simple THREE.js based gcode renderer to display gcode fieles as 3D objects.☆13Jun 13, 2017Updated 8 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A faster your site with image attributes decoding=”async” & loading=”lazy”. Help to Up Your Google Page Speed Score.☆11Mar 10, 2025Updated 11 months ago
- Mahjong solitaire as a browser game☆14Jan 26, 2024Updated 2 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆51Jan 9, 2026Updated last month
- ☆38Aug 27, 2021Updated 4 years ago
- A best AST outsource obfuscation by ngocuyencoder and minhnguyen2412☆49Jun 14, 2024Updated last year
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- The Coding Space Projects☆13Feb 18, 2026Updated 2 weeks ago
- ☆13Dec 14, 2021Updated 4 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- HAL for the RI5CY core of RV32M1 heterogeneous (two ARM and two RISC-V) quad-core SoC.☆10Sep 28, 2020Updated 5 years ago
- LLM supported Toolkit for Blue Team/ SOC Operations☆46Jan 10, 2026Updated last month
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago