EricZimmerman / LECmdLinks
Lnk Explorer Command line edition!!
☆335Updated last year
Alternatives and similar repositories for LECmd
Users that are interested in LECmd are comparing it to the libraries listed below
Sorting:
- Prefetch Explorer Command Line☆280Updated last year
- Parses amcache.hve files, but with a twist!☆149Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆310Updated 2 years ago
- AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10, and Windows 11☆128Updated last year
- Event Tracing For Windows (ETW) Resources☆415Updated 3 months ago
- Beta versions of my software☆269Updated 7 months ago
- C# based evtx parser with lots of extras☆340Updated 5 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆519Updated 3 years ago
- Parses $MFT from NTFS file systems☆292Updated 9 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆160Updated 3 months ago
- Commandline low level file extractor for NTFS☆306Updated 6 years ago
- ☆532Updated 8 months ago
- $MFT directory tree reconstruction & FILE record info☆325Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆185Updated 7 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆273Updated 4 years ago
- Windows Registry Knowledge Base☆195Updated last month
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆492Updated last month
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆343Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆693Updated 3 months ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆247Updated last year
- ☆553Updated 2 years ago
- Encyclopedia for Executables☆472Updated 4 years ago
- ☆823Updated 2 years ago
- Sysmon-Like research tool for ETW☆384Updated 3 years ago
- Windows symbol tables for Volatility 3☆92Updated last year
- Threat Intel IoCs + bits and pieces of dark matter☆433Updated last month
- View ETW Provider manifest☆569Updated last year
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆182Updated last year
- Aims to identify sleeping beacons☆656Updated 2 weeks ago
- RDP Bitmap Cache parser☆630Updated last year