tomchop / volatility-autoruns
Autoruns plugin for the Volatility framework
☆119Updated 5 years ago
Alternatives and similar repositories for volatility-autoruns:
Users that are interested in volatility-autoruns are comparing it to the libraries listed below
- Page File analysis tools.☆125Updated 9 years ago
- ☆82Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆115Updated 8 months ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago
- Python script to decode common encoded PowerShell scripts☆216Updated 6 years ago
- Python IOC Editor☆62Updated 9 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Lazy Office Analyzer☆119Updated 8 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 4 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- PE Import Hash Generator☆75Updated 7 years ago
- Some IR notes☆73Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Web based Manager for Yara Rules☆57Updated 4 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- Reconstruct process trees from event logs☆147Updated 4 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Differential Analysis of Malware in Memory☆211Updated 7 years ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- A warehouse for your malware☆134Updated 11 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- A collection of infosec related scripts and information.☆53Updated 4 months ago