Links to various memory samples
☆43Jul 25, 2025Updated 7 months ago
Alternatives and similar repositories for MemoryForensicSamples
Users that are interested in MemoryForensicSamples are comparing it to the libraries listed below
Sorting:
- Fork this repo! Do a Pull Request! As many times as you want! Learn the ins and outs of how to contribute to GitHub! Make your mistakes h…☆14Jun 21, 2024Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Orchestration Software for Incident Response☆14Updated this week
- Generate Volatility3 profiles from BTF.☆31Dec 21, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Volatility Symbol Generator for Linux Kernels☆36Nov 15, 2023Updated 2 years ago
- Bu bir not defteri programıdır. Sayfalar halinde not tutmanızı sağlar ve sadece Linux işletim sistemi için hazırlanmıştır. Yazdığınız not…☆13Apr 13, 2025Updated 11 months ago
- Java and Android mobile alerting and secure wipe application(s)☆24Oct 8, 2011Updated 14 years ago
- Android Debug Bridge (ADB) over Piping Serer on Web browser☆22Nov 14, 2023Updated 2 years ago
- Tool for diagnostic of Android device☆11Sep 21, 2024Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,838Mar 8, 2021Updated 5 years ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Oct 23, 2022Updated 3 years ago
- Sharing my BITS☆13Feb 23, 2018Updated 8 years ago
- A (purpousely) vulnerable, social-media-like, django web application☆12Jun 10, 2021Updated 4 years ago
- ☆24Mar 12, 2025Updated last year
- Slides from various conferences and talks I've given☆14Oct 12, 2025Updated 5 months ago
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 5 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- PoC ransomware. Inspired by Mr. Robot☆10Jan 12, 2022Updated 4 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- A summary of NSO Group/Circles documents, research and media clippings.☆12Apr 13, 2024Updated last year
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Feb 22, 2026Updated last month
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 11 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Hunt malware with Volatility☆49Mar 3, 2026Updated 2 weeks ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 2 weeks ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- Unifi Images☆26Apr 4, 2025Updated 11 months ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- ☆61Jan 28, 2026Updated last month