leludo84 / vol3-linux-profilesLinks
Volatility3 Linux profiles
β68Updated 2 weeks ago
Alternatives and similar repositories for vol3-linux-profiles
Users that are interested in vol3-linux-profiles are comparing it to the libraries listed below
Sorting:
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ233Updated last month
- Collection of Volatility2 profiles, generated against Linux kernels.β53Updated last month
- Windows symbol tables for Volatility 3β91Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β226Updated last year
- Memory acquisition for Linux that makes sense.β213Updated 2 years ago
- A centralized and enhanced memory analysis platformβ509Updated 4 months ago
- RegRipper4.0β74Updated 3 months ago
- A curated list of ressources for Volatility 2 & 3β12Updated last year
- Volatility Symbol Generator for Linux Kernelsβ36Updated 2 years ago
- Generate Volatility3 profiles from BTF.β30Updated 11 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIRβ689Updated last month
- The Volatility Collaborative GUIβ262Updated this week
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β382Updated 3 months ago
- Volatility, on Docker π³β40Updated last week
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.β296Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.β205Updated last week
- Collection of my volatility3 pluginsβ18Updated last year
- A collection of tools and detections for the Sliver C2 Frameworjβ133Updated 2 years ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!β411Updated last year
- ELFEN: Automated Linux Malware Analysis Sandboxβ129Updated 3 months ago
- A ProcessMonitor visualization application written in rust.β184Updated 2 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount theβ¦β53Updated 5 years ago
- Repository of Yara Rulesβ128Updated 3 weeks ago
- Automated YARA Rule Standardization and Quality Assurance Toolβ259Updated this week
- Dump quarantined files from Windows Defenderβ74Updated 3 years ago
- Memory mapping profiles for forensic analysis using volatility 3β30Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Updated last year
- β147Updated last month
- Rules shared by the community from 100 Days of YARA 2024β86Updated 10 months ago
- Forensics Wiki, a wiki devoted to information about digital forensics (also known as computer forensics)β299Updated last month