mandiant / win10_volatility
An advanced memory forensics framework
☆94Updated 5 years ago
Alternatives and similar repositories for win10_volatility:
Users that are interested in win10_volatility are comparing it to the libraries listed below
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- Lazy Office Analyzer☆119Updated 8 years ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago
- Random hunting ordiented yara rules☆95Updated last year
- ☆82Updated 8 years ago
- Yet another registry parser☆130Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆95Updated this week
- Static based decoders for malware samples☆92Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated last year
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆148Updated 3 years ago
- ☆134Updated 6 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 6 years ago
- ☆97Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- A tool for de-obfuscating PowerShell scripts☆67Updated 5 years ago
- A tool for detecting VBA stomping.☆98Updated 2 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆115Updated 8 months ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- ☆297Updated 4 years ago
- Various capabilities for static malware analysis.☆77Updated 5 months ago
- Generating YARA rules based on binary code☆205Updated 3 years ago
- A modern Python-3-based alternative to RegRipper☆192Updated 2 months ago
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆74Updated 10 years ago
- c2 traffic☆189Updated 2 years ago