Mac OS X Memory Analysis Toolkit
☆174Jul 25, 2016Updated 9 years ago
Alternatives and similar repositories for volafox
Users that are interested in volafox are comparing it to the libraries listed below
Sorting:
- Mac OS X Keychain Forensic Tool☆917May 19, 2023Updated 2 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,892Jun 19, 2019Updated 6 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Jul 3, 2019Updated 6 years ago
- Breaking the iCloud Keychain Artifacts☆107Jan 5, 2024Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Collection of forensics artifacts location for Mac OS X and iOS☆343Nov 11, 2021Updated 4 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Mar 4, 2019Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- A proof-of-concept tool for reading OS X keychain passwords☆513Mar 11, 2019Updated 6 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- Encase Script to parse harddrive for MFT data☆16Jun 17, 2016Updated 9 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last month
- A Mac OS X forensic utility which manages file system mounting in support of forensic procedures.☆698Aug 25, 2025Updated 6 months ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- A pair of utilities to "cat" to the speaker and from the microphone on Mac OS X.☆45Nov 2, 2008Updated 17 years ago
- Security Scanner for OSX☆43Oct 4, 2015Updated 10 years ago
- macOS (& ios) Artifact Parsing Tool☆1,005Feb 26, 2026Updated last week
- Parse nmap scan data with Perl (official repo)☆37Jan 26, 2019Updated 7 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Rekall Memory Forensic Framework☆1,999Oct 18, 2020Updated 5 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Mar 3, 2024Updated 2 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- Page File analysis tools.☆131Dec 3, 2015Updated 10 years ago
- iTerm2 tools for Python☆20Apr 24, 2018Updated 7 years ago
- Audit Preference Pane and Log Reader for OS X☆40Apr 25, 2013Updated 12 years ago
- OSX Installer Verifier☆58Jul 23, 2018Updated 7 years ago
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- Automagically extract forensic timeline from volatile memory dump☆133Updated this week
- ☆22Nov 18, 2015Updated 10 years ago