Allows you to quickly query a Windows machine for RAM artifacts
☆219Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for memtriage
Users that are interested in memtriage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Digital forensic acquisition tool for Windows based incident response.☆346May 7, 2024Updated last year
- Windows 10 Live Information viewer☆39Jan 27, 2022Updated 4 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Query and report user logons relations from MS Windows Security Events☆244Aug 9, 2018Updated 7 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated last month
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- Yet another registry parser☆137Apr 15, 2022Updated 4 years ago
- ☆93Jul 30, 2025Updated 8 months ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Windows Live Artifacts Acquisition Script☆191Jun 20, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automagically extract forensic timeline from volatile memory dump☆133Mar 5, 2026Updated last month
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- An NTFS/FAT parser for digital forensics & incident response☆225Oct 31, 2025Updated 5 months ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 3 months ago
- ☆229May 10, 2018Updated 7 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆208Sep 15, 2021Updated 4 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Extract common Windows artifacts from source images and VSCs☆65May 10, 2021Updated 4 years ago
- Tools for DFIR☆123Jan 25, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Registry Miner☆14Apr 10, 2018Updated 8 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- Rekall Memory Forensic Framework☆33Aug 5, 2019Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆478Apr 8, 2021Updated 5 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆607Sep 7, 2018Updated 7 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 5 months ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago