Simple PowerShell script to enable process scanning with Yara.
☆98Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for YaraMemoryScanner
Users that are interested in YaraMemoryScanner are comparing it to the libraries listed below
Sorting:
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Tool for playing with Windows Access Token manipulation.☆82Nov 28, 2022Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Dec 13, 2022Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆136Dec 20, 2022Updated 3 years ago
- Patch AMSI and ETW☆250May 8, 2024Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 5 months ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Mar 10, 2026Updated last week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- ☆42Apr 22, 2021Updated 4 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆23May 23, 2024Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- ☆16Mar 22, 2023Updated 2 years ago
- A curated list of KAPE-related resources☆184May 1, 2025Updated 10 months ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat a…☆229Jan 6, 2026Updated 2 months ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆488Nov 21, 2024Updated last year
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆954Feb 2, 2026Updated last month
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Event Tracing For Windows (ETW) Resources☆420Oct 30, 2025Updated 4 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆254Oct 29, 2025Updated 4 months ago
- Aims to identify sleeping beacons☆662Jan 25, 2026Updated last month
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago