mandiant / win10_volatilityLinks
An advanced memory forensics framework
☆96Updated 5 years ago
Alternatives and similar repositories for win10_volatility
Users that are interested in win10_volatility are comparing it to the libraries listed below
Sorting:
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- ☆98Updated 4 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- A tool for detecting VBA stomping.☆100Updated 2 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Updated 6 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Various capabilities for static malware analysis.☆78Updated 10 months ago
- A tool for de-obfuscating PowerShell scripts☆69Updated 6 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆75Updated last month
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Static based decoders for malware samples☆93Updated 5 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- YARA rules for use with ProcFilter☆87Updated 8 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 11 months ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- XOR Key Extractor☆50Updated 11 months ago
- Mindmaps for threat hunting - work in progress.☆150Updated 3 years ago
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated last week
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Research indicators and detection rules☆67Updated last year