A Rekall interactive document for a Memory Analysis workshop/course.
☆43Mar 8, 2017Updated 8 years ago
Alternatives and similar repositories for memory-analysis
Users that are interested in memory-analysis are comparing it to the libraries listed below
Sorting:
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Public Profile Repository for Rekall Memory Forensic.☆101Oct 20, 2020Updated 5 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 10 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Stochastic Traffic Factoring Utility☆15Nov 5, 2016Updated 9 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- *DEPRECATED* Advanced skinning plugin for IDA Pro, ported to x64dbg☆32Nov 23, 2016Updated 9 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- ☆55Jul 20, 2017Updated 8 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago