Malformed Access Log to CSV - Convert Web Server Access Logs to CSV
☆18Sep 3, 2024Updated last year
Alternatives and similar repositories for mal2csv
Users that are interested in mal2csv are comparing it to the libraries listed below
Sorting:
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 10 months ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆20Aug 3, 2024Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 2 years ago
- Python web app for previewing data in a Chrome Profile Folder☆23Jul 1, 2024Updated last year
- Library of threat hunts to get any user started!☆49Sep 4, 2020Updated 5 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- ☆20Jan 10, 2025Updated last year
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- ☆21May 8, 2022Updated 3 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Sep 21, 2023Updated 2 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Multi-quarantine extractor☆52Feb 4, 2026Updated 3 weeks ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆24Nov 20, 2025Updated 3 months ago
- CLBX file format☆20May 13, 2021Updated 4 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 4 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago