EricZimmerman / LECmd
Lnk Explorer Command line edition!!
☆286Updated last week
Alternatives and similar repositories for LECmd:
Users that are interested in LECmd are comparing it to the libraries listed below
- AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10☆111Updated this week
- Parses amcache.hve files, but with a twist!☆124Updated this week
- Prefetch Explorer Command Line☆235Updated this week
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆245Updated last year
- Event Tracing For Windows (ETW) Resources☆362Updated 3 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆485Updated 2 years ago
- Windows Registry Knowledge Base☆169Updated 3 months ago
- C# based evtx parser with lots of extras☆285Updated this week
- $MFT directory tree reconstruction & FILE record info☆296Updated 3 months ago
- Beta versions of my software☆246Updated last year
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆317Updated last year
- Sysmon-Like research tool for ETW☆349Updated 2 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆149Updated 3 years ago
- Parses $MFT from NTFS file systems☆210Updated this week
- Commandline low level file extractor for NTFS☆277Updated 5 years ago
- ☆483Updated last month
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆141Updated this week
- Parser for $LogFile on NTFS☆192Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆222Updated 10 months ago
- Command line access to the Registry☆134Updated this week
- ☆227Updated 8 months ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆279Updated 8 months ago
- Parser for $UsnJrnl on NTFS☆108Updated 2 years ago
- 🚀AutoRuns is a PowerShell module that will help do live incident response and enumerate autoruns artifacts that may be used by legitima…☆260Updated last week
- View ETW Provider manifest☆447Updated 2 months ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆154Updated 3 months ago
- Aims to identify sleeping beacons☆525Updated last month
- ☆463Updated last year
- ☆196Updated 2 months ago
- Load any Beacon Object File using Powershell!☆245Updated 3 years ago