Memory Scaner
☆65Sep 9, 2022Updated 3 years ago
Alternatives and similar repositories for MemTracer
Users that are interested in MemTracer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 6 months ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Safe Rust API to libesedb☆12Sep 10, 2025Updated 6 months ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 5 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- File Capability Extractor☆14Jul 12, 2025Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated last month
- Rust crate for accessing keys, values, and data stored in Windows hive (registry) files.☆53Jan 21, 2025Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆91Jul 18, 2023Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- Scanner for certain IoCs☆11Jan 29, 2025Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- ☆56Jan 22, 2025Updated last year
- A dynamic unpacking tool☆149Sep 17, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆76Jan 6, 2026Updated 2 months ago
- ☆10Aug 9, 2024Updated last year
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆384Nov 2, 2023Updated 2 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 3 years ago
- Get the process name or process id on windows☆20Jun 1, 2025Updated 9 months ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆130Sep 27, 2023Updated 2 years ago