Silv3rHorn / autoripyLinks
Attempt to replicate the functions of auto_rip by Corey Harrell in Python.
☆13Updated last year
Alternatives and similar repositories for autoripy
Users that are interested in autoripy are comparing it to the libraries listed below
Sorting:
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 9 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- macOS Artifact Intelligence Tool☆13Updated 6 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Git for me to put all my forensics stuff☆23Updated 2 months ago
- A DFVFS Backed Forensic Viewer☆41Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- Collection of scripts used to analyse malware or emails☆20Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Miscellaneous Scripts☆17Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆25Updated 3 years ago
- ☆23Updated 8 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- NTFS file system specimens☆13Updated 2 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Yara rules☆22Updated 2 years ago
- Mass Triage Tools☆20Updated 3 weeks ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆18Updated last year
- Converting data from services like Censys and Shodan to a common data model☆51Updated 4 months ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 7 years ago
- Disk Image Mounting Script☆10Updated 3 months ago
- Site for IWS book content☆17Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 9 months ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated last year
- LNK to JSON☆14Updated 6 years ago