Linux-KVM with rVMI extensions
☆22Aug 28, 2017Updated 8 years ago
Alternatives and similar repositories for rvmi-kvm
Users that are interested in rvmi-kvm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 5 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Very WIP taint analysis for DynamoRIO (ARM)☆21Apr 10, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Modified edition of cuckoomon☆53Jun 4, 2018Updated 7 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆62May 30, 2023Updated 2 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 4 months ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Cockroach is your primitive & immortal swiss army knife.☆48Dec 8, 2021Updated 4 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆29Nov 14, 2018Updated 7 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- KVM-based Virtual Machine Introspection☆362Oct 11, 2025Updated 5 months ago
- Bunch of different UPX Unpackers I found☆35Nov 30, 2019Updated 6 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- A platform for building proxies to bypass network restrictions.☆12May 31, 2020Updated 5 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago