Volatility plugins
☆12Feb 19, 2015Updated 11 years ago
Alternatives and similar repositories for Volatility-plugins
Users that are interested in Volatility-plugins are comparing it to the libraries listed below
Sorting:
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Static extraction of dridex malware configuration☆19Nov 2, 2015Updated 10 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 9 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 3 months ago
- learn the basics of gulp☆10Aug 17, 2015Updated 10 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- This iOS 9 app lets you use your own filter list in Safari.☆11Sep 5, 2015Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Examples for using the dedupe library☆10Feb 22, 2016Updated 10 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Discourse's calendar plugin☆13Mar 3, 2018Updated 7 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- ☆12Jun 22, 2022Updated 3 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- Place to store .md notes and host other things related to work I do☆15Jun 20, 2023Updated 2 years ago
- ☆14May 20, 2019Updated 6 years ago