A short and small memory forensics helper.
☆52Oct 18, 2017Updated 8 years ago
Alternatives and similar repositories for muninn
Users that are interested in muninn are comparing it to the libraries listed below
Sorting:
- Customisable PCAP parser and research assistant☆26Jan 8, 2018Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- ☆42Jul 3, 2022Updated 3 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Pure Python parser for classic Windows Event Log files (.evt)☆52Jun 30, 2023Updated 2 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Man in the Middle SOCKS Proxy for JAVA☆37Feb 14, 2013Updated 13 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Apr 23, 2020Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 3 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Aug 6, 2018Updated 7 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 6 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago