Rekall Memory Forensic Framework
☆1,997Oct 18, 2020Updated 5 years ago
Alternatives and similar repositories for rekall
Users that are interested in rekall are comparing it to the libraries listed below
Sorting:
- GRR Rapid Response: remote live forensics for incident response☆5,040Feb 16, 2026Updated last week
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- Super timeline all the things☆2,017Feb 10, 2026Updated 2 weeks ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,936Nov 9, 2025Updated 3 months ago
- Public Profile Repository for Rekall Memory Forensic.☆101Oct 20, 2020Updated 5 years ago
- Collaborative forensic timeline analysis☆3,271Updated this week
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- Digital Forensics artifact repository☆1,207Feb 11, 2026Updated 2 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Updated this week
- ☆519Jan 26, 2021Updated 5 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,922May 3, 2022Updated 3 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- An AFF4 C++ implementation.☆214Mar 24, 2023Updated 2 years ago
- Repository of yara rules☆4,722Apr 17, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,231Aug 7, 2025Updated 6 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,813Jan 19, 2020Updated 6 years ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,267Nov 6, 2025Updated 3 months ago
- DRAKVUF Black-box Binary Analysis☆1,208Feb 11, 2026Updated 2 weeks ago
- CRITs - Collaborative Research Into Threats☆909Jul 29, 2019Updated 6 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,893Jun 19, 2019Updated 6 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- Defund the Police.☆13,472Jun 7, 2024Updated last year
- The pattern matching swiss knife☆9,439Feb 10, 2026Updated 2 weeks ago
- A curated list of tools for incident response☆8,832Jul 18, 2024Updated last year
- Your Everyday Threat Intelligence☆1,951Feb 12, 2026Updated 2 weeks ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- Automation and Scaling of Digital Forensics Tools☆785Feb 19, 2026Updated last week
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,993Feb 18, 2026Updated last week