ETW forensic tool for Volatility3 plugin
☆17Nov 15, 2024Updated last year
Alternatives and similar repositories for etw-scan
Users that are interested in etw-scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 9, 2025Updated 4 months ago
- Generate Volatility3 profiles from BTF.☆31Dec 21, 2024Updated last year
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Mar 30, 2026Updated last week
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Apr 2, 2026Updated last week
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Mar 30, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python Scenario-Based OpenID Connect Testing Tool☆38Dec 8, 2023Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- USN Journal full path builder☆68Apr 4, 2026Updated last week
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- rpv-web is a browser based frontend for the rpv library☆27Nov 21, 2025Updated 4 months ago
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Feb 3, 2024Updated 2 years ago
- A simple apple crash report parser for rust☆26Mar 25, 2026Updated 2 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Capture BAT is a behavioral analysis tool of applications for the Win32 operating system family.☆32Jun 28, 2013Updated 12 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 8 months ago
- Archive of challenges @ Flatt Security Mini CTFs☆19Aug 20, 2025Updated 7 months ago
- A summary of NSO Group/Circles documents, research and media clippings.☆12Apr 13, 2024Updated last year
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆13May 2, 2024Updated last year
- An open-source, cross-platform application for Acorn ADFS and DFS disc image manipulation☆14Apr 10, 2018Updated 8 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 11 months ago
- Stand-alone copy of Androguard from http://code.google.com/p/androguard/☆16Mar 13, 2014Updated 12 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays☆57Feb 17, 2026Updated last month
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- REplicated STORagE☆13Mar 23, 2023Updated 3 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- AVX-2 vectorised 8-bit positional popcount for Go☆23Aug 28, 2020Updated 5 years ago
- ☆15May 3, 2024Updated last year
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, Plaso, $MFT, and $J files with built-in process inspect…☆227Mar 21, 2026Updated 3 weeks ago
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆75Apr 3, 2026Updated last week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago