GDATAAdvancedAnalytics / winreg-tasksLinks
☆19Updated 3 years ago
Alternatives and similar repositories for winreg-tasks
Users that are interested in winreg-tasks are comparing it to the libraries listed below
Sorting:
- Powershell Linter☆80Updated last month
- Dump quarantined files from Windows Defender☆65Updated 3 years ago
- ☆238Updated 2 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- Elastic Security Labs releases☆80Updated last month
- Yara Rules for Modern Malware☆79Updated last year
- ☆106Updated last year
- ☆173Updated 4 months ago
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- ☆57Updated 10 months ago
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆113Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- ☆252Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 8 months ago
- Carve file metadata from NTFS index ($I30) attributes☆70Updated last year
- Alternative YARA scanning engine☆72Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆64Updated last year
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆110Updated 4 years ago
- ☆113Updated last month
- A collection of my yara rules☆34Updated 2 years ago
- ShellSweeping the evil.☆53Updated last year
- Linux #rootkit and #malware revealer☆26Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 3 months ago
- http://moaistory.blogspot.com/2018/10/winsearchdbanalyzer.html☆125Updated last year
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- Repository of Yara Rules☆115Updated 4 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago