leludo84 / vol3-linux-profilesLinks
Volatility3 Linux profiles
β42Updated last week
Alternatives and similar repositories for vol3-linux-profiles
Users that are interested in vol3-linux-profiles are comparing it to the libraries listed below
Sorting:
- Collection of Volatility2 profiles, generated against Linux kernels.β43Updated 3 weeks ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ141Updated 3 weeks ago
- Windows symbol tables for Volatility 3β86Updated 10 months ago
- Volatility Symbol Generator for Linux Kernelsβ35Updated last year
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performsβ¦β188Updated last year
- A collection of tools and detections for the Sliver C2 Frameworjβ126Updated 2 years ago
- Memory mapping profiles for forensic analysis using volatility 2β47Updated 2 years ago
- Generate Volatility3 profiles from BTF.β23Updated 5 months ago
- Memory acquisition for Linux that makes sense.β196Updated last year
- A centralized and enhanced memory analysis platformβ463Updated 2 weeks ago
- Volatility, on Docker π³β34Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Updated 8 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β214Updated 3 months ago
- Use YARA rules on Time Travel Debugging tracesβ90Updated last year
- A ProcessMonitor visualization application written in rust.β180Updated last year
- RegRipper4.0β50Updated last month
- Repository of Yara Rulesβ111Updated last month
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hosβ¦β31Updated 3 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount theβ¦β50Updated 5 years ago
- Powershell Linterβ53Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tβ¦β123Updated 4 months ago
- Memory mapping profiles for forensic analysis using volatility 3β26Updated 3 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func β¦β64Updated last month
- Elastic Security Labs releasesβ67Updated 2 weeks ago
- FLARE Team's Binary Navigatorβ260Updated last week
- The Volatility Collaborative GUIβ243Updated last week
- Configuration Extractors for Malwareβ106Updated last month
- Dump quarantined files from Windows Defenderβ63Updated 3 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIRβ629Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2024β85Updated 5 months ago