Rurik / FileInfoLinks
Basic file metadata gathering script
☆21Updated 8 months ago
Alternatives and similar repositories for FileInfo
Users that are interested in FileInfo are comparing it to the libraries listed below
Sorting:
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- ☆16Updated 10 years ago
- ☆26Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- List of scripts used for malware analysis☆15Updated 10 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Server for receiving autorun data from the clients☆13Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- My metasploit modules☆24Updated 9 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Yaras Random☆22Updated 6 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- Oracle Attacks Tool☆13Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 11 years ago