volatility3 icon indicating copy to clipboard operation
volatility3 copied to clipboard

Malware categorization: categorize EDR evading plugins with in/direct_syscall

Open SolitudePy opened this issue 6 months ago • 0 comments

Categorized 2 related plugins as .malware.:

  • indirect_system_calls, direct_system_calls

I did not find any fixes needed other than import statements, I tried running them and it seemed okay, but not sure since they are structured different than other plugins.

SolitudePy avatar Jun 14 '25 20:06 SolitudePy