Carve Windows Prefetch files from arbitrary binary data
☆16Jun 11, 2017Updated 8 years ago
Alternatives and similar repositories for Windows-Prefetch-Carver
Users that are interested in Windows-Prefetch-Carver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Script for querying Google home devices☆11May 27, 2018Updated 7 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆122May 29, 2024Updated last year
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 7 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- ☆29Jul 6, 2017Updated 8 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆11Mar 5, 2018Updated 8 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 9 years ago
- Simple code generation library developed in C intended for code generation in Kernel mode☆17Dec 9, 2022Updated 3 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 9 years ago
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 10 years ago
- Generate a Bitcoin paper wallet offline as a png file, no need for a browser.☆23Mar 27, 2017Updated 9 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆43Jan 22, 2016Updated 10 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Extracts Windows user info including the password hashes☆40Jul 26, 2016Updated 9 years ago
- Plugin for x64dbg☆13Apr 29, 2017Updated 9 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago