Volatility 3.0 development
☆3,931Feb 20, 2026Updated last week
Alternatives and similar repositories for volatility3
Users that are interested in volatility3 are comparing it to the libraries listed below
Sorting:
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- The multi-platform memory acquisition tool.☆946Oct 14, 2025Updated 4 months ago
- Digging Deeper....☆3,771Feb 21, 2026Updated last week
- MemProcFS☆4,015Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,378Dec 23, 2025Updated 2 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,472Feb 19, 2026Updated last week
- AVML - Acquire Volatile Memory for Linux☆1,055Feb 20, 2026Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- Adversary Emulation Framework☆10,717Updated this week
- Malware Configuration And Payload Extraction☆3,019Feb 19, 2026Updated last week
- The pattern matching swiss knife☆9,439Feb 10, 2026Updated 2 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,340Feb 14, 2026Updated 2 weeks ago
- Trying to tame the three-headed dog.☆4,893Nov 14, 2025Updated 3 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,336Dec 6, 2025Updated 2 months ago
- RegRipper3.0☆684Dec 12, 2024Updated last year
- Six Degrees of Domain Admin☆10,550Aug 1, 2025Updated 6 months ago
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,054Updated this week
- A little tool to play with Windows security☆21,281May 11, 2025Updated 9 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Updated this week
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,290Feb 14, 2026Updated 2 weeks ago
- convert ELF/DWARF symbol and type information into vol3's intermediate JSON☆145Oct 9, 2024Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Updated this week
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,128Updated this week
- Super timeline all the things☆2,017Feb 10, 2026Updated 2 weeks ago
- A curated list of awesome YARA rules, tools, and people.☆4,138Mar 26, 2025Updated 11 months ago
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆3,015Oct 25, 2025Updated 4 months ago
- Program for determining types of files for Windows, Linux and MacOS.☆10,303Updated this week
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,027Feb 21, 2026Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,336Jan 26, 2026Updated last month
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,479Jan 10, 2025Updated last year
- CTF framework and exploit development library☆13,278Updated this week
- Mimikatz implementation in pure Python☆3,245Jan 2, 2026Updated last month
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,936Nov 9, 2025Updated 3 months ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Automated Adversary Emulation Platform☆6,761Feb 17, 2026Updated last week