BSI-Bund / RdpCacheStitcherLinks
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
☆310Updated 2 years ago
Alternatives and similar repositories for RdpCacheStitcher
Users that are interested in RdpCacheStitcher are comparing it to the libraries listed below
Sorting:
- Parses amcache.hve files, but with a twist!☆149Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆160Updated 3 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆519Updated 3 years ago
- ☆214Updated 2 months ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆343Updated 2 years ago
- RDP Bitmap Cache parser☆630Updated last year
- C# based evtx parser with lots of extras☆340Updated 5 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- Lnk Explorer Command line edition!!☆335Updated last year
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆306Updated 4 years ago
- Live forensic artifacts collector☆172Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆273Updated 4 years ago
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- ☆532Updated 8 months ago
- ☆553Updated 2 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆182Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Updated 3 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- Ransomware simulator written in Golang☆470Updated 3 years ago
- ☆194Updated 2 years ago
- Windows symbol tables for Volatility 3☆92Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324Updated 9 months ago
- RegRipper4.0☆81Updated last month
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Updated 4 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆229Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆185Updated 7 months ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago