spitfirerxf / vol3-pluginsLinks
Collection of my volatility3 plugins
☆18Updated 9 months ago
Alternatives and similar repositories for vol3-plugins
Users that are interested in vol3-plugins are comparing it to the libraries listed below
Sorting:
- Collection of Volatility2 profiles, generated against Linux kernels.☆43Updated 3 weeks ago
- Memory mapping profiles for forensic analysis using volatility 3☆26Updated 3 years ago
- ☆37Updated 5 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- ☆20Updated last year
- Powershell Linter☆53Updated last month
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- Malware Analysis tools☆26Updated 8 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆62Updated last month
- ysoserial.net docker image☆28Updated 8 months ago
- a simple python script to de-obfuscate ABOBUS Batch script obfuscator☆9Updated 5 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆19Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆61Updated 5 months ago
- Volatility, on Docker 🐳☆34Updated last month
- Contains compiled binaries of Volatility☆33Updated 2 weeks ago
- https://lolad-project.github.io/☆76Updated 5 months ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago
- Volatility Symbol Generator for Linux Kernels☆35Updated last year
- Windows symbol tables for Volatility 3☆86Updated 10 months ago
- Hardened your Windows OS against forensics analysis☆21Updated 6 months ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆13Updated 3 months ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- ☆23Updated 3 months ago
- ☆18Updated last year
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆50Updated 5 years ago
- Bitpixie exploitation PoC☆39Updated 2 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆17Updated 5 months ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- some leaked src code for known and unknown malwares☆21Updated 2 months ago