superponible / volatility-pluginsLinks
Plugins I've written for Volatility
☆213Updated 2 years ago
Alternatives and similar repositories for volatility-plugins
Users that are interested in volatility-plugins are comparing it to the libraries listed below
Sorting:
- Volatility plugins developed and maintained by the community☆372Updated 4 years ago
- Beta versions of my software☆268Updated 5 months ago
- Volatility profiles for Linux and Mac OS X☆326Updated 3 years ago
- RDP Bitmap Cache parser☆583Updated 10 months ago
- An advanced memory forensics framework☆96Updated 6 years ago
- Volatility Plugins☆64Updated 2 years ago
- Parses amcache.hve files, but with a twist!☆144Updated 10 months ago
- Setup scripts for my Malware Analysis VMs☆257Updated 3 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆142Updated 3 years ago
- Repository of yara rules☆49Updated 10 years ago
- A tool for de-obfuscating PowerShell scripts☆71Updated 6 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Updated 11 years ago
- ☆306Updated 5 years ago
- Generating YARA rules based on binary code☆216Updated 4 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆428Updated 4 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆464Updated 3 months ago
- Volatility plugin for extracts configuration data of known malware☆496Updated last year
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆618Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- c2 traffic☆192Updated 2 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆296Updated 2 years ago
- YARA Rules I come across on the internet☆355Updated last year
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆202Updated 8 months ago
- An NTFS/FAT parser for digital forensics & incident response☆217Updated last month
- snake - a malware storage zoo☆217Updated 2 years ago
- Malware Sandboxes & Malware Source☆102Updated 8 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- Windows Shortcut file (LNK) parser☆136Updated 3 years ago
- An open source script to perform malware static analysis on Portable Executable☆318Updated 2 years ago