VolatilityBot
Memory analyzer
Automates memory analysis of malware samples and memory dumps by extracting binaries, injections, strings, and analyzing code using heuristics and YARA/Clam AV scanners.
VolatilityBot – An automated memory analyzer for malware samples and memory dumps
263 stars
27 watching
59 forks
Language: Python
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
kevthehermit/volutility | A web-based tool for analyzing memory dumps using the Volatility framework. | 380 |
bashtage/arch | Provides tools and models for analyzing financial time series and detecting patterns in volatility. | 1,340 |
shanek2/invtero.net | Analyzes and validates physical memory from various systems to extract process information and hypervisor details | 279 |
carlospolop/autovolatility | A tool for running multiple volatility plugins simultaneously to analyze and extract data from memory dumps. | 108 |
kd8bny/limeaide | Automates the process of remotely dumping RAM and creating volatility profiles on Linux clients. | 161 |
gleeda/memtriage | Analyze Windows machine RAM artifacts using Winpmem and Volatility | 218 |
jpcertcc/malconfscan | Tools to extract configuration data from known malware samples in memory images. | 485 |
jameshabben/evolve | A web interface for analyzing memory dumps using the Volatility framework, providing an interactive and collaborative environment for forensic analysis. | 259 |
ldo-cert/orochi | A framework for collaborative memory dump analysis using Volatility and distributed processing | 225 |
usualsuspect/malscan | A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches | 12 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
citronneur/volatility-wnf | Tools for analyzing Windows Notification Facilities and related data | 15 |
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 274 |
jnraber/virtualdeobfuscator | Analyzes malware runtraces to remove virtual machine-based protections and extract the original binary's bytecode instructions | 133 |
mrphrazer/hitb2021ams_deobfuscation | Automated deobfuscation of malware code using symbolic execution and simplification techniques | 71 |