kevthehermit / volatility_plugins
Volatility Plugins
☆62Updated last year
Alternatives and similar repositories for volatility_plugins:
Users that are interested in volatility_plugins are comparing it to the libraries listed below
- Static based decoders for malware samples☆92Updated 4 years ago
- Smart DLL execution for malware analysis in sandbox systems☆141Updated 9 years ago
- POSHSPY backdoor code☆43Updated 7 years ago
- Toolset for research malware and Cobalt Strike beacons☆206Updated last year
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆122Updated 5 years ago
- Malware Sinkhole List in various formats☆102Updated 2 years ago
- Carve NTFS USN records from binary data☆24Updated 7 years ago
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆55Updated 7 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆82Updated last year
- A tool for detecting VBA stomping.☆97Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆107Updated 6 years ago
- A command line tool for creating malicious outlook rules☆160Updated 6 years ago
- ☆58Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆53Updated 5 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆138Updated 6 years ago
- Parse evtx files and detect use of the DanderSpritz eventlogedit module☆148Updated 7 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆56Updated 2 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated last year
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 6 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆59Updated 6 years ago
- ☆82Updated 8 years ago
- A python script used to parse the SAM registry hive.☆72Updated 6 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Lazy Office Analyzer☆119Updated 7 years ago