SherifEldeeb / COPPLinks
COFEE of Poor People
☆12Updated 12 years ago
Alternatives and similar repositories for COPP
Users that are interested in COPP are comparing it to the libraries listed below
Sorting:
- ☆16Updated 10 years ago
- Various scrips☆12Updated 2 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- onigiri - remote malware triage script☆24Updated 9 years ago
- Some dfir stuff☆31Updated 3 years ago
- Why hunt when you can seine?☆21Updated 10 years ago
- ☆9Updated 7 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Various DFIR Tools☆26Updated 6 years ago
- misc scripts☆36Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Tools☆13Updated 2 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆15Updated 8 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Registry Miner☆14Updated 7 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago