varc
Volatile Analysis Tool
An instrument for capturing and analyzing system volatility data to aid in security incident investigation
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Archived
252 stars
7 watching
13 forks
Language: Python
last commit: 12 months ago
Linked from 1 awesome list
awsaws-fargateaws-forensicsaws-lambdacloud-securitydfirdfir-automationdocker-forensicseks-forensicsfargate-forensicsforensicshacktoberfestmemory-forensicssecurity
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A curated list of open-source tools for assessing and improving AWS security posture | 9,007 |
| | A customizable tool for creating bootable disk images for remote system analysis and forensic investigations. | 464 |
| | Tools to identify and remove critical risks in cloud infrastructure accounts by analyzing metadata from APIs of various cloud services | 1,617 |
| | Analyzes and validates physical memory from various systems to extract process information and hypervisor details | 281 |
| | Provides real-time code quality checks and suggestions to help developers write proper C# code | 65 |
| | A tool for detecting common bugs in binary executables. | 1,155 |
| | A tool for running multiple volatility plugins simultaneously to analyze and extract data from memory dumps. | 110 |
| | A digital forensics tool for analyzing macOS and iOS systems | 790 |
| | A tool for static code analysis on mobile applications to identify security vulnerabilities and bugs | 830 |
| | An AWS CloudTrail monitoring tool for alerting on suspicious activity | 51 |
| | Analyzes AWS environments to identify security issues and network configurations. | 6,017 |
| | A Python interface to the WebRTC Voice Activity Detector | 2,088 |
| | A data analysis and visualization application built on the VTK library | 1,334 |
| | A framework for collaborative memory dump analysis using Volatility and distributed processing | 226 |
| | A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. | 2,043 |