monnappa22 / HollowFindLinks
Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect and divert the forensic analysis techniques. The plugin detects such attacks by finding discrepancy in the VAD and PEB, it also disassembles the address of entry point to detect any redirection attempts and als…
☆139Updated 2 years ago
Alternatives and similar repositories for HollowFind
Users that are interested in HollowFind are comparing it to the libraries listed below
Sorting:
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Generating YARA rules based on binary code☆215Updated 3 years ago
- ☆84Updated 5 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- YARA rules for use with ProcFilter☆87Updated 8 years ago
- Smart DLL execution for malware analysis in sandbox systems☆145Updated 10 years ago
- ☆134Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 10 years ago
- A tool for de-obfuscating PowerShell scripts☆70Updated 6 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆119Updated last year
- An advanced memory forensics framework☆96Updated 5 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆78Updated 3 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 3 years ago
- ☆97Updated 4 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- c2 traffic☆190Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Live hunting of code injection techniques☆383Updated 6 years ago
- Psinfo is a Volatility plugin which collects the process related information from the VAD (Virtual Address Descriptor) and PEB (Process E…☆36Updated 8 years ago
- PE Import Hash Generator☆81Updated 8 years ago
- A taxonomy and dictionary of malware behaviors.☆43Updated 6 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆197Updated 6 months ago
- Static based decoders for malware samples☆93Updated 5 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆162Updated 9 months ago