spitfirerxf / vol3-pluginsLinks
Collection of my volatility3 plugins
☆18Updated last year
Alternatives and similar repositories for vol3-plugins
Users that are interested in vol3-plugins are comparing it to the libraries listed below
Sorting:
- Collection of Volatility2 profiles, generated against Linux kernels.☆54Updated last month
- Memory mapping profiles for forensic analysis using volatility 3☆30Updated 3 years ago
- ☆39Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆133Updated 2 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 8 months ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆226Updated last year
- Configuration Extractors for Malware☆121Updated 7 months ago
- Powershell Linter☆86Updated last week
- Malware Analysis tools☆26Updated last year
- Windows symbol tables for Volatility 3☆91Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆76Updated 3 months ago
- Retrieve inner payloads from Donut samples☆113Updated 2 weeks ago
- Volatility3 Linux profiles☆70Updated last week
- Volatility, on Docker 🐳☆39Updated 3 weeks ago
- Repository of Yara Rules☆131Updated last week
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆53Updated 5 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated last year
- ☆114Updated 2 weeks ago
- Some of my Malware Analysis writeups☆48Updated 2 months ago
- https://lolad-project.github.io/☆83Updated 11 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆188Updated this week
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆51Updated 3 years ago
- Dump quarantined files from Windows Defender☆73Updated 3 years ago
- IDA Python scripts☆40Updated 8 months ago
- some leaked src code for known and unknown malwares☆22Updated 4 months ago
- ☆46Updated last month
- ☆68Updated 3 years ago
- ☆84Updated last year