leludo84 / vol3-linux-profiles
Volatility3 Linux profiles
β30Updated this week
Alternatives and similar repositories for vol3-linux-profiles:
Users that are interested in vol3-linux-profiles are comparing it to the libraries listed below
- Collection of Volatility2 profiles, generated against Linux kernels.β33Updated 2 weeks ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ90Updated 2 weeks ago
- Windows symbol tables for Volatility 3β81Updated 6 months ago
- A collection of tools and detections for the Sliver C2 Frameworjβ115Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β166Updated 9 months ago
- Volatility Symbol Generator for Linux Kernelsβ32Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hosβ¦β30Updated 2 years ago
- RegRipper4.0β43Updated last year
- Memory acquisition for Linux that makes sense.β171Updated last year
- A ProcessMonitor visualization application written in rust.β176Updated last year
- Volatility, on Docker π³β33Updated 6 months ago
- Memory mapping profiles for forensic analysis using volatility 2β46Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIRβ569Updated 2 months ago
- Powershell Linterβ50Updated 2 months ago
- Linpmem is a linux memory acquisition toolβ76Updated 8 months ago
- A centralized and enhanced memory analysis platformβ423Updated this week
- Collection of my volatility3 pluginsβ17Updated 4 months ago
- Repository of Yara Rulesβ97Updated last month
- Memory mapping profiles for forensic analysis using volatility 3β25Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tβ¦β117Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β145Updated 4 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.β160Updated this week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIRβ223Updated 10 months ago
- Use YARA rules on Time Travel Debugging tracesβ88Updated last year
- Python tool to check rootkits in Windows kernelβ181Updated 2 months ago
- β196Updated 3 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.β94Updated last year
- PowerShell Script Analyzerβ67Updated last year
- Configuration Extractors for Malwareβ86Updated this week
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated last year