google / rekall
Rekall Memory Forensic Framework
☆1,946Updated 4 years ago
Alternatives and similar repositories for rekall:
Users that are interested in rekall are comparing it to the libraries listed below
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,794Updated 5 months ago
- Binary analysis and management framework☆1,542Updated last year
- Super timeline all the things☆1,803Updated 3 weeks ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,143Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,876Updated 2 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,662Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,462Updated 2 weeks ago
- GRR Rapid Response: remote live forensics for incident response☆4,859Updated 3 weeks ago
- DRAKVUF Black-box Binary Analysis☆1,099Updated last week
- A static analyzer for PE executables.☆1,047Updated last year
- CRITs - Collaborative Research Into Threats☆900Updated 5 years ago
- yarGen is a generator for YARA rules☆1,617Updated 9 months ago
- Malcom - Malware Communications Analyzer☆1,157Updated 7 years ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,752Updated this week
- Python low-interaction honeyclient☆1,006Updated last week
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,633Updated 2 years ago
- Repository of yara rules☆4,321Updated 11 months ago
- An advanced memory forensics framework☆7,589Updated last year
- The Python interface for YARA☆684Updated last week
- FAME Automates Malware Evaluation☆882Updated last month
- Digital Forensics artifact repository☆1,093Updated 2 months ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆496Updated 10 months ago
- Collaborative forensic timeline analysis☆2,712Updated this week
- Malicious HTTP traffic explorer☆717Updated 2 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,394Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,039Updated 3 years ago
- Volatility profiles for Linux and Mac OS X☆321Updated 2 years ago
- Fast Incident Response☆1,848Updated last week
- ☆957Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,742Updated this week