memoryforensics1 / VolExp
volatility explorer
☆91Updated 4 years ago
Alternatives and similar repositories for VolExp
Users that are interested in VolExp are comparing it to the libraries listed below
Sorting:
- Volatility Explorer Suit☆63Updated 2 years ago
- Volatility3 plugins developed and maintained by the community☆53Updated 2 years ago
- Windows symbol tables for Volatility 3☆85Updated 10 months ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Lazarus analysis tools and research report☆56Updated last year
- A small util to brute-force prefetch hashes☆77Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- Volatility Symbol Generator for Linux Kernels☆34Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆123Updated 5 months ago
- Parses amcache.hve files, but with a twist!☆133Updated 4 months ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆165Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 3 months ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆76Updated 9 months ago
- AdHoc solutions☆48Updated last year
- ☆23Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆152Updated 3 years ago
- Manipulate timestamps on NTFS☆50Updated 10 years ago
- Tracking APT IOCs☆25Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Use YARA rules on Time Travel Debugging traces☆90Updated last year
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Generate YARA rules for OOXML documents.☆38Updated last year
- ☆34Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago