Public Profile Repository for Rekall Memory Forensic.
☆101Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for rekall-profiles
Users that are interested in rekall-profiles are comparing it to the libraries listed below
Sorting:
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- Rekall Memory Forensic Framework☆1,997Oct 18, 2020Updated 5 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Clerk is an open-source IPFIX generator using https://github.com/google/testimony for packet sniffing☆38May 3, 2018Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- Catnip Sandbox☆26Jan 10, 2018Updated 8 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- ☆147Updated this week
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- ☆15Mar 20, 2017Updated 8 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- ☆14Jul 15, 2024Updated last year
- Mirror source code metadata between git-notes and Phabricator☆30May 31, 2019Updated 6 years ago
- A software architectural modeling tool for programmers.☆31Jan 10, 2017Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Automation and Scaling of Digital Forensics Tools☆785Feb 19, 2026Updated last week
- ☆13Jul 22, 2019Updated 6 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- ☆12Sep 20, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/nfc-smart-tag☆12Mar 17, 2015Updated 10 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆19Feb 19, 2017Updated 9 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆127Feb 9, 2023Updated 3 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- A RESTful API frontend for Stenographer☆54Dec 7, 2022Updated 3 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Import Bro logs from SecurityOnion into Logstash☆15Nov 10, 2015Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago