Volatility, on Docker 🐳
☆41Nov 20, 2025Updated 5 months ago
Alternatives and similar repositories for volatility3-docker
Users that are interested in volatility3-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Aug 30, 2022Updated 3 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Windows symbol tables for Volatility 3☆93Jul 11, 2024Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- 使用Docker一键制作vol3取证需要的的SymbolTables☆12Aug 31, 2025Updated 8 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆60Mar 2, 2025Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆19Feb 9, 2025Updated last year
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Volatility Explorer Suit☆67Jan 3, 2023Updated 3 years ago
- Volatility3 Linux profiles☆78Apr 24, 2026Updated last week
- ☆59Oct 12, 2024Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 5 months ago
- ☆54May 14, 2024Updated last year
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Displays a list of open listening sockets. It is a minimal alternative to ss or netstat.☆39Jan 10, 2026Updated 3 months ago
- An example C++ repository built with CMake on Linux using GitLab CI and analyzed on SonarQube☆11Updated this week
- Python client for DFIR-IRIS☆26Aug 19, 2024Updated last year
- Dynamic Check Challenges with docker-compose for CTFd V3.4.0+.☆22Mar 26, 2022Updated 4 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 7 years ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆292Apr 14, 2026Updated 2 weeks ago
- Automatically generate Meme Compilation Videos for YouTube☆17Apr 7, 2026Updated 3 weeks ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- Incident Response - Fast suspicious file finder☆256Jan 24, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Explore how Unix-like OS (Linux, BSD, macOS...) modify MACB timestamps and check against POSIX (non-)compliance☆18Oct 14, 2024Updated last year
- ☆12Mar 23, 2026Updated last month
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆126Mar 27, 2026Updated last month
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago