juergh / lqs2mem
Convert libvirt-QEMU-save (LQS) files to raw memory files
☆37Updated last year
Related projects ⓘ
Alternatives and complementary repositories for lqs2mem
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 5 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆43Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆32Updated 8 months ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- ☆35Updated 12 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆21Updated 8 years ago
- Collection of scripts for radare2☆28Updated 5 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 6 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago