Beercow / OneDriveExplorer
OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat and <UserCid>.dat.previous file.
☆192Updated 3 weeks ago
Alternatives and similar repositories for OneDriveExplorer:
Users that are interested in OneDriveExplorer are comparing it to the libraries listed below
- Repository of attack and defensive information for Business Email Compromise investigations☆247Updated last month
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- A repo that aims to centralize a current, running list of relevant parsers/tools for known DFIR artifacts☆57Updated 3 months ago
- PowerShell module for Office 365 and Azure log collection☆260Updated this week
- Notes on responding to security breaches relating to Azure AD☆102Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆136Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated last month
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆66Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆278Updated 6 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆107Updated last year
- Parses USB connection artifacts from offline Registry hives☆95Updated last month
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆113Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- ☆199Updated 4 months ago
- Powershell module for VMWare vSphere forensics☆149Updated 4 months ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- USN Journal full path builder☆56Updated 5 months ago
- ☆5Updated 4 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆55Updated last month
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆88Updated 4 years ago
- ☆86Updated last year
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆45Updated 5 months ago
- Active C&C Detector☆152Updated last year
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆262Updated 3 years ago
- $MFT directory tree reconstruction & FILE record info☆297Updated 5 months ago
- Windows Forensics Environment Builder☆130Updated 2 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 9 months ago
- Full of public notes and Utilities☆98Updated last month
- Pushes Sysmon Configs☆89Updated 3 years ago