0xTowel / BMC-Viewer-Backup
A Backup for BMC Viewer
☆17Updated 7 years ago
Alternatives and similar repositories for BMC-Viewer-Backup:
Users that are interested in BMC-Viewer-Backup are comparing it to the libraries listed below
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- Publicly shareable windows event log message data☆27Updated 5 years ago
- Carve NTFS USN records from binary data☆25Updated 7 years ago
- Binary commandline executable to parse ETL files☆67Updated 6 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆56Updated 3 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated last month
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- Tool to parse SRU database☆24Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Updated 4 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- PE Import Hash Generator☆76Updated 7 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 3 months ago
- ☆39Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆42Updated 6 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- Random hunting ordiented yara rules☆95Updated 2 years ago
- Parses IE's Automatic Crash Recovery Files☆16Updated 8 years ago
- Windows registry samples☆23Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Updated 7 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 2 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago