kevthehermit / volatility_plugins
Volatility Plugins
☆62Updated last year
Alternatives and similar repositories for volatility_plugins:
Users that are interested in volatility_plugins are comparing it to the libraries listed below
- Static based decoders for malware samples☆92Updated 4 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Toolset for research malware and Cobalt Strike beacons☆207Updated 2 years ago
- POSHSPY backdoor code☆43Updated 7 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆103Updated 4 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Malware Sinkhole List in various formats☆102Updated 2 years ago
- ☆82Updated 8 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆169Updated this week
- DLL Password Filter Implant with Exfiltration Capabilities☆135Updated 4 years ago
- ☆78Updated 8 years ago
- Repository for my ATT&CK analysis research.☆68Updated 5 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆107Updated 6 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆122Updated 5 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- A "tiny" meterpreter stager☆126Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- A tool for detecting VBA stomping.☆98Updated 2 years ago
- A command line tool for creating malicious outlook rules☆160Updated 6 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last week
- Repository of yara rules☆44Updated 9 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 4 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- ☆58Updated 7 years ago