☆33Nov 21, 2024Updated last year
Alternatives and similar repositories for PowerForensicsPortable
Users that are interested in PowerForensicsPortable are comparing it to the libraries listed below
Sorting:
- ☆29Aug 9, 2016Updated 9 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Feb 23, 2016Updated 10 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- OSCP material tools and helpful scripts.☆11Mar 14, 2025Updated 11 months ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆453Nov 21, 2024Updated last year
- A module for working with McAfee EPO API☆14Dec 31, 2019Updated 6 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- PwshDocker is a PowerShell wrapper around the Docker CLI☆15May 25, 2020Updated 5 years ago
- The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) App…☆26Oct 21, 2025Updated 4 months ago
- A curated list of tools for incident response☆13Jan 22, 2024Updated 2 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Digital Forensics Artifacts Knowledge Base☆89Dec 23, 2025Updated 2 months ago
- ☆18Jun 23, 2017Updated 8 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated last week
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Digital forensic acquisition tool for Windows based incident response.☆347May 7, 2024Updated last year
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- ☆21Apr 15, 2016Updated 9 years ago
- ☆24Nov 3, 2019Updated 6 years ago
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- An exercise in live coding.☆25Aug 12, 2015Updated 10 years ago