Volatility 3.0 development
☆3,981Mar 16, 2026Updated this week
Alternatives and similar repositories for volatility3
Users that are interested in volatility3 are comparing it to the libraries listed below
Sorting:
- An advanced memory forensics framework☆7,982May 16, 2025Updated 10 months ago
- The multi-platform memory acquisition tool.☆955Oct 14, 2025Updated 5 months ago
- AVML - Acquire Volatile Memory for Linux☆1,064Updated this week
- Digging Deeper....☆3,832Updated this week
- MemProcFS☆4,042Mar 2, 2026Updated 2 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,438Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,476Mar 2, 2026Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- The pattern matching swiss knife☆9,490Feb 10, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- convert ELF/DWARF symbol and type information into vol3's intermediate JSON☆148Oct 9, 2024Updated last year
- Malware Configuration And Payload Extraction☆3,082Updated this week
- Adversary Emulation Framework☆10,838Updated this week
- Trying to tame the three-headed dog.☆4,920Nov 14, 2025Updated 4 months ago
- RegRipper3.0☆687Dec 12, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,484Updated this week
- Super timeline all the things☆2,034Feb 10, 2026Updated last month
- Main Sigma Rule Repository☆10,203Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,384Updated this week
- Six Degrees of Domain Admin☆10,551Mar 2, 2026Updated 2 weeks ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,300Feb 14, 2026Updated last month
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,954Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Updated this week
- A curated list of awesome YARA rules, tools, and people.☆4,163Updated this week
- A little tool to play with Windows security☆21,334May 11, 2025Updated 10 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,688Mar 13, 2026Updated last week
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆3,047Oct 25, 2025Updated 4 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,197Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,085Feb 25, 2026Updated 3 weeks ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,062Feb 24, 2026Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,383Jan 26, 2026Updated last month
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆701Oct 22, 2025Updated 4 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,504Jan 10, 2025Updated last year
- Program for determining types of files for Windows, Linux and MacOS.☆10,433Updated this week
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- CTF framework and exploit development library☆13,315Mar 5, 2026Updated 2 weeks ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,816Mar 3, 2026Updated 2 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- The Havoc Framework☆8,245Dec 18, 2025Updated 3 months ago