PoorBillionaire / USN-Record-CarverLinks
Carve NTFS USN records from binary data
☆27Updated 8 years ago
Alternatives and similar repositories for USN-Record-Carver
Users that are interested in USN-Record-Carver are comparing it to the libraries listed below
Sorting:
- Binary commandline executable to parse ETL files☆68Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆63Updated 4 years ago
- Tool to parse SRU database☆25Updated 7 years ago
- Parses IE's Automatic Crash Recovery Files☆16Updated 8 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- Tools for parsing Forensic images☆41Updated 7 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 9 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- Various DFIR Tools☆26Updated 7 years ago
- Binaries for the log2timeline projects and dependencies☆39Updated last month
- Windows registry samples☆24Updated 7 years ago
- Some dfir stuff☆30Updated 3 years ago
- Publicly shareable windows event log message data☆27Updated 6 years ago
- A DFVFS Backed Forensic Viewer☆40Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 3 years ago
- LNK to JSON☆14Updated 6 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated 10 months ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Yet another registry parser☆138Updated 3 years ago
- Decode security descriptors in $Secure on NTFS☆21Updated 3 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 8 years ago
- Fast incident overview☆41Updated 8 years ago
- ☆82Updated 9 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Updated 8 years ago
- Python IOC Editor☆64Updated 10 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- ☆39Updated 6 years ago