mandiant / rvmi-kvmView external linksLinks
Linux-KVM with rVMI extensions
☆22Aug 28, 2017Updated 8 years ago
Alternatives and similar repositories for rvmi-kvm
Users that are interested in rvmi-kvm are comparing it to the libraries listed below
Sorting:
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- 关闭恶意驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Modified edition of cuckoomon☆51Jun 4, 2018Updated 7 years ago
- Open-source decompilation of Disstrack☆13Oct 18, 2016Updated 9 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Very WIP taint analysis for DynamoRIO (ARM)☆20Apr 10, 2018Updated 7 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Tools for analyzing hexagon code☆39Jun 22, 2016Updated 9 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 2 months ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated 2 weeks ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 2 months ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/portable-executable-library☆22Oct 5, 2019Updated 6 years ago
- History and analysis of Windows desktop images☆19Jan 28, 2021Updated 5 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Dec 8, 2021Updated 4 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago