Volatility plugins
☆12Feb 19, 2015Updated 11 years ago
Alternatives and similar repositories for Volatility-plugins
Users that are interested in Volatility-plugins are comparing it to the libraries listed below
Sorting:
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Static extraction of dridex malware configuration☆19Nov 2, 2015Updated 10 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 8 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Apr 22, 2015Updated 10 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 9 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 13 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- An HTTP protocol parser in Common Lisp☆21Jul 27, 2020Updated 5 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- JSADO automatically deobfuscates javascript scripts which use eval or some other function☆17Nov 5, 2013Updated 12 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- ☆30Jun 24, 2018Updated 7 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- QTrace, a "zero knowledge" system call tracer☆54Jan 3, 2015Updated 11 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- Discourse's calendar plugin☆13Mar 3, 2018Updated 8 years ago
- A rust crate to use stack-allocated vectors (to improve performance and/or when there is no std)☆12Feb 16, 2019Updated 7 years ago
- GuardianCTF 2018 Writeups Repository☆12Apr 13, 2019Updated 6 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- Using terraform to automate the deployment of SharePoint in AWS. The Terraform template creates the entire stack, and uses provisioners a…☆20May 2, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Checks with NSRL RDS servers looking for for hash matches☆115Feb 26, 2021Updated 5 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆142Apr 16, 2021Updated 4 years ago