varc
Volatile Analysis Tool
An instrument for capturing and analyzing system volatility data to aid in security incident investigation
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Archived
252 stars
7 watching
13 forks
Language: Python
last commit: 3 months ago
Linked from 1 awesome list
awsaws-fargateaws-forensicsaws-lambdacloud-securitydfirdfir-automationdocker-forensicseks-forensicsfargate-forensicsforensicshacktoberfestmemory-forensicssecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| A curated list of open-source tools for assessing and improving AWS security posture | 9,007 |
| A customizable tool for creating bootable disk images for remote system analysis and forensic investigations. | 464 |
| Tools to identify and remove critical risks in cloud infrastructure accounts by analyzing metadata from APIs of various cloud services | 1,617 |
| Analyzes and validates physical memory from various systems to extract process information and hypervisor details | 281 |
| Provides real-time code quality checks and suggestions to help developers write proper C# code | 65 |
| A tool for detecting common bugs in binary executables. | 1,155 |
| A tool for running multiple volatility plugins simultaneously to analyze and extract data from memory dumps. | 110 |
| A digital forensics tool for analyzing macOS and iOS systems | 790 |
| A tool for static code analysis on mobile applications to identify security vulnerabilities and bugs | 830 |
| An AWS CloudTrail monitoring tool for alerting on suspicious activity | 51 |
| Analyzes AWS environments to identify security issues and network configurations. | 6,017 |
| A Python interface to the WebRTC Voice Activity Detector | 2,088 |
| A data analysis and visualization application built on the VTK library | 1,334 |
| A framework for collaborative memory dump analysis using Volatility and distributed processing | 226 |
| A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. | 2,043 |