A Rekall interactive document for a Memory Analysis workshop/course.
☆43Mar 8, 2017Updated 9 years ago
Alternatives and similar repositories for memory-analysis
Users that are interested in memory-analysis are comparing it to the libraries listed below
Sorting:
- Public Profile Repository for Rekall Memory Forensic.☆101Oct 20, 2020Updated 5 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- ☆55Jul 20, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago