spitfirerxf / vol3-pluginsLinks
Collection of my volatility3 plugins
☆18Updated last year
Alternatives and similar repositories for vol3-plugins
Users that are interested in vol3-plugins are comparing it to the libraries listed below
Sorting:
- Collection of Volatility2 profiles, generated against Linux kernels.☆54Updated 2 months ago
- Memory mapping profiles for forensic analysis using volatility 3☆30Updated 3 years ago
- ☆39Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆134Updated 2 years ago
- Powershell Linter☆86Updated 3 weeks ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆228Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 4 months ago
- Volatility, on Docker 🐳☆41Updated last month
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 9 months ago
- A set of tools and resources for analysis of Havoc C2☆26Updated last year
- A curated list of ressources for Volatility 2 & 3☆13Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆47Updated 4 months ago
- Volatility3 Linux profiles☆71Updated 3 weeks ago
- Dump quarantined files from Windows Defender☆73Updated 3 years ago
- Windows symbol tables for Volatility 3☆91Updated last year
- ☆121Updated this week
- Some of my Malware Analysis writeups☆48Updated 3 months ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Updated last year
- Configuration Extractors for Malware☆121Updated 8 months ago
- Retrieve inner payloads from Donut samples☆115Updated last month
- Memory mapping profiles for forensic analysis using volatility 2☆51Updated 3 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆54Updated 5 years ago
- ysoserial.net docker image☆28Updated last year
- ☆63Updated last year
- Malware Analysis tools☆26Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated last year
- ☆71Updated 11 months ago
- ☆34Updated 2 years ago