iAbadia / Volatility-Plugin-Tutorial
Development guide for Volatility Plugins
☆23Updated 7 years ago
Alternatives and similar repositories for Volatility-Plugin-Tutorial:
Users that are interested in Volatility-Plugin-Tutorial are comparing it to the libraries listed below
- An offensive Powershell console☆30Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Simple DDE object detector☆56Updated 7 years ago
- ☆17Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- 504 VSAgent☆23Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- Some IR notes☆73Updated 8 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- ☆97Updated 8 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- PowerShell Empire docker build☆23Updated 8 years ago
- ☆41Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- Useful Threat Hunting Stuff☆31Updated 4 years ago
- ☆9Updated 7 years ago
- Some dfir stuff☆31Updated 3 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- ☆113Updated 7 years ago
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici …☆82Updated 7 years ago