moneta
Memory analyzer
A tool for analyzing memory on Windows systems to detect malware IOCs
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
707 stars
14 watching
86 forks
Language: C++
last commit: 11 months ago artifactdumphollowinginjectioniocmalwarememorymonetapeprocessreflectivescannershellcodeusermodewindows
Related projects:
Repository | Description | Stars |
---|---|---|
| Analyze Windows machine RAM artifacts using Winpmem and Volatility | 218 |
| A repository of malware indicators and rules for threat hunting and analysis. | 1,698 |
| A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches | 12 |
| Analyzes and validates physical memory from various systems to extract process information and hypervisor details | 281 |
| A tool for processing Windows memory images to extract relevant information | 260 |
| Automates memory analysis of malware samples and memory dumps by extracting binaries, injections, strings, and analyzing code using heuristics and YARA/Clam AV scanners. | 264 |
| Analyzes C code for its memory layout and dependencies | 25 |
| Analyzes and dumps memory to extract sensitive information from running processes | 582 |
| A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| Automated tool for forensic analysis of Windows memory dumps | 555 |
| Analyzes Portable Executable malware and malicious MS Office documents for various suspicious features | 612 |
| Analyzes running processes to detect and dump malicious code | 2,047 |
| A tool to detect memory-based evasion techniques used in malware and rootkits | 711 |
| A tool to assist in memory forensics analysis on Windows systems by automating the process of extracting and exporting relevant data from memory images. | 52 |
| An emulator-based tool to detect kernel memory disclosure vulnerabilities by tracking uninitialized memory in guest operating systems. | 297 |