Volatility, on Docker π³
β41Nov 20, 2025Updated 4 months ago
Alternatives and similar repositories for volatility3-docker
Users that are interested in volatility3-docker are comparing it to the libraries listed below
Sorting:
- Bring Your Own Mitre Att&ck Β© Matrix !β13Oct 19, 2023Updated 2 years ago
- Knowing which rule should trigger according to the redcannary testβ11Nov 23, 2024Updated last year
- Sigma rules converted for direct use with Zircoliteβ14Mar 16, 2026Updated last week
- petit "playbook" qui pourrait servir de base Γ une rΓ©ponse Γ incident lors d'une attaque de type ransomwareβ21Aug 30, 2022Updated 3 years ago
- enpoint detection / live analysis & sandbox host / signatures quality testβ44Apr 22, 2021Updated 4 years ago
- Windows symbol tables for Volatility 3β93Jul 11, 2024Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interactionβ88Mar 11, 2026Updated last week
- Sigma detection rules for hunting with the threathunting-keywords projectβ58Mar 2, 2025Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hosβ¦β33Mar 9, 2022Updated 4 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.β55Oct 30, 2025Updated 4 months ago
- β42Sep 16, 2022Updated 3 years ago
- Klara docker composeβ11May 19, 2020Updated 5 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Siβ¦β12May 25, 2016Updated 9 years ago
- Volatility Explorer Suitβ67Jan 3, 2023Updated 3 years ago
- Volatility3 Linux profilesβ76Dec 8, 2025Updated 3 months ago
- β55Oct 12, 2024Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma libraryβ50Sep 1, 2023Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.β32Nov 23, 2025Updated 3 months ago
- β54May 14, 2024Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exeβ14Mar 29, 2017Updated 8 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(β¦β11Feb 2, 2023Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysisβ13Jun 1, 2021Updated 4 years ago
- Python client for DFIR-IRISβ25Aug 19, 2024Updated last year
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis πβ273Updated this week
- Dynamic Check Challenges with docker-compose for CTFd V3.4.0+.β21Mar 26, 2022Updated 3 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchersβ21Apr 27, 2019Updated 6 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containersβ18Jan 10, 2024Updated 2 years ago
- Incident Response - Fast suspicious file finderβ253Jan 24, 2026Updated last month
- Windows link file (shortcuts) examinerβ68Jun 9, 2024Updated last year
- NTFS Security Descriptor Stream ($Secure:$SDS) parserβ14Jan 9, 2023Updated 3 years ago
- Explore how Unix-like OS (Linux, BSD, macOS...) modify MACB timestamps and check against POSIX (non-)complianceβ18Oct 14, 2024Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.β133Jan 31, 2022Updated 4 years ago
- β12Updated this week
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.β21Mar 12, 2019Updated 7 years ago
- Mass Triage Toolsβ20Mar 10, 2026Updated last week
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.β22Feb 15, 2022Updated 4 years ago
- volatility explorerβ92Nov 16, 2020Updated 5 years ago
- A pcap capture analysis helperβ25Aug 30, 2023Updated 2 years ago
- The Sigma command line interface based on pySigmaβ181Feb 5, 2026Updated last month