inVtero.net
Memory analyzer
Analyzes and validates physical memory from various systems to extract process information and hypervisor details
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
279 stars
30 watching
57 forks
Language: C#
last commit: about 1 year ago
Linked from 3 awesome lists
attestationcloud-computingforensicshypervisorintegrity-monitoringmemory-analysismemory-dumpmemory-hackingmicroarchitecturepatch-managementreverse-engineeringsecure-hashvirtual-machine
Related projects:
Repository | Description | Stars |
---|---|---|
mkorman90/volatilitybot | Automates memory analysis of malware samples and memory dumps by extracting binaries, injections, strings, and analyzing code using heuristics and YARA/Clam AV scanners. | 263 |
kevthehermit/volutility | A web-based tool for analyzing memory dumps using the Volatility framework. | 380 |
ldo-cert/orochi | A framework for collaborative memory dump analysis using Volatility and distributed processing | 225 |
rek7/mxtract | Analyzes and dumps memory to extract sensitive information from running processes | 582 |
invoke-ir/powerforensics | A C#-based framework for analyzing and investigating hard drive forensic data | 1,385 |
reclassnet/reclass.net | A .NET-based port of ReClass with additional features and support for various data types and memory analysis tools. | 1,829 |
nsmfoo/antivmdetection | A tool to create templates making VirtualBox VM detection harder | 712 |
jpcertcc/malconfscan | Tools to extract configuration data from known malware samples in memory images. | 485 |
kevoreilly/capev2 | A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. | 2,011 |
ytisf/muninn | A tool to assist in memory forensics analysis on Windows systems by automating the process of extracting and exporting relevant data from memory images. | 52 |
mikepopoloski/slang | Provides tools and services for compiling, parsing, and analyzing SystemVerilog code | 620 |
vannevelj/vsdiagnostics | Provides real-time code quality checks and suggestions to help developers write proper C# code | 65 |
gleeda/memtriage | Analyze Windows machine RAM artifacts using Winpmem and Volatility | 218 |
n0fate/volafox | A memory analysis toolkit for macOS developed in Python | 165 |
forrest-orr/moneta | A tool for analyzing memory on Windows systems to detect malware IOCs | 685 |