volatilityfoundation / volatility
An advanced memory forensics framework
☆7,589Updated last year
Alternatives and similar repositories for volatility:
Users that are interested in volatility are comparing it to the libraries listed below
- Volatility 3.0 development☆2,958Updated this week
- The pattern matching swiss knife☆8,632Updated 3 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,462Updated 2 weeks ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,794Updated 5 months ago
- Repository of yara rules☆4,321Updated 11 months ago
- CTF framework and exploit development library☆12,417Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,053Updated last week
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,636Updated 2 years ago
- A curated list of awesome YARA rules, tools, and people.☆3,730Updated last month
- Loki - Simple IOC and YARA Scanner☆3,495Updated 4 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,876Updated 2 months ago
- Automated Adversary Emulation Platform☆5,946Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,624Updated 4 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,654Updated last week
- Adversary Emulation Framework☆9,063Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,235Updated 11 months ago
- A swiss army knife for pentesting networks☆8,641Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,391Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,568Updated 5 years ago
- Rekall Memory Forensic Framework☆1,946Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆14,054Updated this week
- Linux privilege escalation auditing tool☆5,862Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,010Updated 2 months ago
- ☆3,542Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,130Updated 6 months ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,752Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,258Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,858Updated 9 months ago
- Windows Exploit Suggester - Next Generation☆4,358Updated this week
- Advanced vulnerability scanning with Nmap NSE☆3,578Updated 6 months ago