memoryforensics1 / VolExpLinks
volatility explorer
☆92Updated 5 years ago
Alternatives and similar repositories for VolExp
Users that are interested in VolExp are comparing it to the libraries listed below
Sorting:
- QuasarRAT analysis tools and research report☆28Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- AdHoc solutions☆48Updated 2 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆45Updated 4 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆26Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆53Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆42Updated last month
- ProcDot Malware Sandbox☆26Updated 5 months ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- ☆23Updated 5 years ago
- ☆23Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆36Updated 3 years ago
- ☆24Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ☆22Updated last year
- Volatility Explorer Suit☆66Updated 3 years ago
- ☆46Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 3 years ago
- My Malware Analysis Reports☆24Updated 3 years ago
- Volatility3 plugins developed and maintained by the community☆61Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆29Updated 4 years ago
- Windows symbol tables for Volatility 3☆92Updated last year
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago