Comae Hibernation File Decompressor
☆156Apr 1, 2023Updated 2 years ago
Alternatives and similar repositories for Hibr2Bin
Users that are interested in Hibr2Bin are comparing it to the libraries listed below
Sorting:
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Incident Response & Digital Forensics Debugging Extension☆389Dec 11, 2018Updated 7 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- modify binary Portable Executable to hook its export functions☆67Jan 13, 2019Updated 7 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv …☆343Jun 25, 2022Updated 3 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 3 months ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55May 18, 2019Updated 6 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- A search tool for IDA☆70Nov 26, 2016Updated 9 years ago
- analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multip…☆523Aug 13, 2025Updated 6 months ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Replay RDP traffic from PCAP☆201Jun 25, 2019Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago
- Python script for extracting USB information from Windows registry hives☆128Aug 14, 2019Updated 6 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- An AFF4 C++ implementation.☆214Mar 24, 2023Updated 2 years ago