Squiblydoo / debloatLinks
A GUI and CLI tool for removing bloat from executables
☆410Updated last month
Alternatives and similar repositories for debloat
Users that are interested in debloat are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆374Updated 6 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆374Updated 11 months ago
- Memory acquisition for Linux that makes sense.☆201Updated last year
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆305Updated last month
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆198Updated last year
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆663Updated 2 weeks ago
- A repository of credential stealer formats☆222Updated last month
- Different learning materials☆227Updated 4 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆190Updated this week
- A ProcessMonitor visualization application written in rust.☆181Updated 2 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆167Updated 4 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆368Updated 2 years ago
- ☆203Updated 9 months ago
- A centralized and enhanced memory analysis platform☆481Updated 3 weeks ago
- ☆237Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆344Updated 2 weeks ago
- ☆161Updated last year
- ☆370Updated last week
- Python tool to check rootkits in Windows kernel☆198Updated 5 months ago
- Repository of Yara Rules☆114Updated 3 months ago
- AssemblyLine 4: File triage and malware analysis☆342Updated this week
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆650Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆232Updated this week
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆414Updated 4 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆312Updated 2 weeks ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 4 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆283Updated this week
- ☆500Updated last year
- Multi-quarantine extractor☆47Updated 3 months ago
- High Octane Triage Analysis☆763Updated this week