memoryforensics1 / VolExpLinks
volatility explorer
☆90Updated 4 years ago
Alternatives and similar repositories for VolExp
Users that are interested in VolExp are comparing it to the libraries listed below
Sorting:
- Volatility Explorer Suit☆63Updated 2 years ago
- Volatility3 plugins developed and maintained by the community☆57Updated 2 years ago
- Windows symbol tables for Volatility 3☆86Updated 10 months ago
- Lazarus analysis tools and research report☆56Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆77Updated 9 months ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- Batch script to compile a binary shellcode blob into an exe file☆85Updated 5 years ago
- Volatility Symbol Generator for Linux Kernels☆35Updated last year
- LILO based Pulse Secure appliance disk image decryptor☆13Updated last year
- Malware Configuration Extraction Modules☆50Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆167Updated 2 months ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 4 months ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Small visualizator for PE files☆69Updated last year
- Use YARA rules on Time Travel Debugging traces☆90Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated 2 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- ☆23Updated 10 months ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- AdHoc solutions☆48Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Python based CLI for MalwareBazaar☆37Updated 7 months ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago