volatilityfoundation / volatility3
Volatility 3.0 development
☆2,822Updated this week
Alternatives and similar repositories for volatility3:
Users that are interested in volatility3 are comparing it to the libraries listed below
- An advanced memory forensics framework☆7,462Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,779Updated this week
- Malware Configuration And Payload Extraction☆2,109Updated this week
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,684Updated 3 years ago
- A curated list of awesome YARA rules, tools, and people.☆3,646Updated 2 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,376Updated this week
- YARA signature and IOC database for my scanners and tools☆2,525Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,834Updated last month
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,070Updated last month
- Automated Adversary Emulation Platform☆5,786Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,215Updated this week
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆2,972Updated 3 weeks ago
- Wiki to collect Red Team infrastructure hardening resources☆4,195Updated 9 months ago
- Please no pull requests for this repository. Thanks!☆2,089Updated 3 weeks ago
- Repository of yara rules☆4,247Updated 9 months ago
- A list of cyber-chef recipes and curated links☆2,049Updated 7 months ago
- Digging Deeper....☆3,058Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,057Updated this week
- Interesting APT Report Collection And Some Special IOC☆2,480Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,045Updated 3 months ago
- A collaborative, multi-platform, red teaming framework☆3,373Updated 2 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,800Updated 6 months ago
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- Binaries for the book Practical Malware Analysis☆1,201Updated 2 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,747Updated 4 months ago
- Adversary Emulation Framework☆8,782Updated this week
- Windows Exploit Suggester - Next Generation☆4,289Updated last week
- Linux privilege escalation auditing tool☆5,739Updated 11 months ago
- Mimikatz implementation in pure Python☆2,935Updated 2 weeks ago
- The pattern matching swiss knife☆8,463Updated this week