Allows you to quickly query a Windows machine for RAM artifacts
☆218Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for memtriage
Users that are interested in memtriage are comparing it to the libraries listed below
Sorting:
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆356Feb 11, 2026Updated 3 weeks ago
- Digital forensic acquisition tool for Windows based incident response.☆347May 7, 2024Updated last year
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- ☆229May 10, 2018Updated 7 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- ☆93Jul 30, 2025Updated 7 months ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last week
- Yet another registry parser☆138Apr 15, 2022Updated 3 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆608Sep 7, 2018Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- An NTFS/FAT parser for digital forensics & incident response☆220Oct 31, 2025Updated 4 months ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- ☆99May 3, 2018Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,136Oct 19, 2025Updated 4 months ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Tools for DFIR☆120Jan 25, 2018Updated 8 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- Test Blue Team detections without running any attack.☆271May 2, 2024Updated last year