0xHasanM / Autopsy-Registry-ExplorerLinks
Autopsy Module to analyze Registry Hives
☆15Updated 3 years ago
Alternatives and similar repositories for Autopsy-Registry-Explorer
Users that are interested in Autopsy-Registry-Explorer are comparing it to the libraries listed below
Sorting:
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆45Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Help deobfuscate VBScript☆18Updated 3 years ago
- ProcDot Malware Sandbox☆26Updated 5 months ago
- A python package that helps with analysis of MSI files☆14Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- Work in Progress repo☆15Updated 6 years ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- ☆12Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ☆26Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- C# User Simulation☆33Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- ☆36Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 4 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Continuous kerberoast monitor☆45Updated 2 years ago
- ☆23Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago