superponible / volatility-pluginsLinks
Plugins I've written for Volatility
☆206Updated last year
Alternatives and similar repositories for volatility-plugins
Users that are interested in volatility-plugins are comparing it to the libraries listed below
Sorting:
- Volatility plugins developed and maintained by the community☆365Updated 4 years ago
- Beta versions of my software☆259Updated last month
- Volatility profiles for Linux and Mac OS X☆325Updated 2 years ago
- RDP Bitmap Cache parser☆549Updated 6 months ago
- An advanced memory forensics framework☆96Updated 5 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆425Updated 4 years ago
- Volatility Plugins☆64Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆254Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆606Updated 2 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- Parses amcache.hve files, but with a twist!☆140Updated 6 months ago
- ☆206Updated last month
- Artifact analysis tools by JPCERT/CC Analysis Center☆460Updated last year
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆226Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year
- c2 traffic☆189Updated 2 years ago
- Windows Shortcut file (LNK) parser☆135Updated 2 years ago
- ☆304Updated 4 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Repository of yara rules☆46Updated 9 years ago
- Generating YARA rules based on binary code☆213Updated 3 years ago
- A tool for detecting VBA stomping.☆100Updated 3 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆433Updated 5 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆283Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆269Updated 4 years ago