Rurik / FileInfoLinks
Basic file metadata gathering script
☆21Updated 9 months ago
Alternatives and similar repositories for FileInfo
Users that are interested in FileInfo are comparing it to the libraries listed below
Sorting:
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆26Updated 5 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Oracle Attacks Tool☆13Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- Some rules, scripts of some use to us☆11Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- ☆22Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 3 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 6 years ago
- Server for receiving autorun data from the clients☆13Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago