juergh / lqs2mem
Convert libvirt-QEMU-save (LQS) files to raw memory files
☆37Updated last year
Alternatives and similar repositories for lqs2mem:
Users that are interested in lqs2mem are comparing it to the libraries listed below
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 6 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- ☆36Updated 12 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- ☆17Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- yara rules for crypto detection☆30Updated 11 years ago
- ☆38Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago