juergh / lqs2memLinks
Convert libvirt-QEMU-save (LQS) files to raw memory files
☆38Updated 2 years ago
Alternatives and similar repositories for lqs2mem
Users that are interested in lqs2mem are comparing it to the libraries listed below
Sorting:
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Updated 10 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 11 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Manage VT Alerts☆62Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 11 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Updated 9 years ago
- malware-traffic-analysis.net PCAPs repository.☆38Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Volatility Plugins☆21Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Automated memory forensics analysis☆32Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 12 years ago
- POLAR☆74Updated 6 years ago