volatilityfoundation / dwarf2jsonLinks
convert ELF/DWARF symbol and type information into vol3's intermediate JSON
☆138Updated last year
Alternatives and similar repositories for dwarf2json
Users that are interested in dwarf2json are comparing it to the libraries listed below
Sorting:
- Windows symbol tables for Volatility 3☆91Updated last year
- Linpmem is a linux memory acquisition tool☆94Updated 4 months ago
- Generate Volatility3 profiles from BTF.☆29Updated 10 months ago
- Volatility3 plugins developed and maintained by the community☆60Updated 2 years ago
- Memory acquisition for Linux that makes sense.☆213Updated last year
- Volatility Symbol Generator for Linux Kernels☆36Updated 2 years ago
- Volatility3 Linux profiles☆68Updated last week
- Volatility, on Docker 🐳☆40Updated 3 weeks ago
- A guide on how to write fast and memory friendly YARA rules☆157Updated 9 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆76Updated this week
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 2 months ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆53Updated 2 weeks ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- FLARE Team's Binary Navigator☆293Updated last month
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆52Updated 5 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆226Updated last year
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆17Updated 9 months ago
- Elastic Security Labs releases☆81Updated 3 weeks ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆143Updated 2 months ago
- Use YARA rules on Time Travel Debugging traces☆96Updated 2 years ago
- ☆109Updated 2 years ago
- ☆110Updated 2 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆122Updated last year
- Red Canary's eBPF Sensor☆111Updated 5 months ago
- Powershell Linter☆84Updated this week
- ☆212Updated last week
- A golang CLI tool to download malware from a variety of sources.☆151Updated 4 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆257Updated this week
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆72Updated last month