All Projects → volatilityfoundation → Community

volatilityfoundation / Community

Volatility plugins developed and maintained by the community

Programming Languages

python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to Community

mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-80.56%)
Mutual labels:  malware
VBoxCloak
A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
Stars: ✭ 49 (-80.56%)
Mutual labels:  malware
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-63.89%)
Mutual labels:  malware
MalScan
A Simple PE File Heuristics Scanners
Stars: ✭ 41 (-83.73%)
Mutual labels:  malware
MalwareHashDB
Malware hashes for open source projects.
Stars: ✭ 31 (-87.7%)
Mutual labels:  malware
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-87.3%)
Mutual labels:  malware
fake-sandbox
👁‍🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.
Stars: ✭ 110 (-56.35%)
Mutual labels:  malware
Hack-Utils
Script to facilitate different functions and checks
Stars: ✭ 27 (-89.29%)
Mutual labels:  malware
MalwareDatabase
Malware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-91.67%)
Mutual labels:  malware
freki
🐺 Malware analysis platform
Stars: ✭ 327 (+29.76%)
Mutual labels:  malware
ips-bph-framework
BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture
Stars: ✭ 21 (-91.67%)
Mutual labels:  malware
AutoIt-Ripper
Extract AutoIt scripts embedded in PE binaries
Stars: ✭ 101 (-59.92%)
Mutual labels:  malware
Ransomware
Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
Stars: ✭ 19 (-92.46%)
Mutual labels:  malware
MSE
Malware sample exchange system and API intended for Anti-Virus companies and researchers.
Stars: ✭ 14 (-94.44%)
Mutual labels:  malware
Yobi
Yara Based Detection Engine for web browsers
Stars: ✭ 39 (-84.52%)
Mutual labels:  malware
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-92.86%)
Mutual labels:  malware
malware-s2e
Code for my blog post on using S2E for malware analysis
Stars: ✭ 21 (-91.67%)
Mutual labels:  malware
TeleShadow2
TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-65.08%)
Mutual labels:  malware
M-Botnet
A C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (-84.52%)
Mutual labels:  malware
carrierwave-attachmentscanner
Adds the ability to send CarrierWave uploads to Attachment Scanner for virus and malware prevention.
Stars: ✭ 14 (-94.44%)
Mutual labels:  malware

community

Volatility plugins developed and maintained by the community. See the README file inside each author's subdirectory for a link to their respective GitHub profile page where you can find usage instructions, dependencies, license information, and future updates for the plugins.

usage

  1. Git clone the Volatility repository or Download a Release
  2. Git clone this repository to $PLUGINSPATH
  3. Pass the --plugins=$PLUGINSPATH option to Volatility when you run it (see Specifying Additional Plugin Directories)

NOTE: If you pass the root of the $PLUGINSPATH directory, then all plugins will recursively be loaded. Its possible that plugins may try to register the same command line options and produce a conflict. If this happens, just point --plugins at one or more specific subdirectories (: separated on Linux/Mac or ; separated on Windows).

disclaimer

These plugins are written by various authors and collected from the authors' GitHub repositories, websites and blogs at a particular point in time. We don't guarantee that the plugins you download from this repo will be the most recent ones published by the individual authors, that they're compatible with the most recent version of Volatility, or that they report results accurately.

contributing

The best way to contribute is to fork the repository, add or modify plugins, and then submit a pull request.

frameworks

Researchers and developers in the community have also created frameworks that build on top of Volatility. These aren't necessarily Volatility plugins (that you would import with --plugins) and usually they contain additional modules, configurations, and components. For that reason, we don't feature those frameworks in this repository, but we'd still like to reference them:

  • Autopsy Plugins by Mark McKinnon
  • PyREBox by Xabier Ugarte-Pedrero at Cisco Talos
  • Cuckoo Sandbox uses Volatility for its Memory module
  • VolDiff Malware Memory Footprint Analysis by @aim4r
  • Evolve Web interface for the Volatility Memory Forensics Framework by James Habben
  • GVol Lightweight GUI (Java) by EG-CERT
  • LibVMI Simplified Virtual Machine Introspection
  • DAMM Differencial Analysis of Malware in Memory
  • YaraVol GUI for Volatility Framework and Yara
  • VolUtility Web Interface for Volatility by Kevin Breen
  • ROPMEMU A framework to analyze, dissect and decompile complex code-reuse attacks by Mariano Graziano
  • VolatilityBot An automated memory analyzer for malware samples and memory dumps by Martin Korman
  • ProfileScan Profile detection for Volatility by Stanislas Lejay (P1kachu)

Don't see your project here? Let us know by submitting a pull request, creating an issue, or tweet us at @volatility.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].