TrullJ / sticky-keys-scannerLinks
A PowerShell function that scans for the existence of a Sticky Keys backdoor.
☆24Updated 8 years ago
Alternatives and similar repositories for sticky-keys-scanner
Users that are interested in sticky-keys-scanner are comparing it to the libraries listed below
Sorting:
- Automated forensics written in PowerShell☆34Updated 6 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 5 years ago
- Binary commandline executable to parse ETL files☆68Updated 7 years ago
- Endpoint monitoring stack.☆19Updated 10 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Updated 3 years ago
- SQL scripts for querying event logs☆21Updated 8 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Updated 7 years ago
- ☆52Updated 7 years ago
- Windows registry samples☆24Updated 7 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- ☆33Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15Updated 6 years ago
- Active Directory Group Policy analyzer☆108Updated 11 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 7 years ago
- A curated list of tools for incident response☆34Updated last year
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Fast incident overview☆41Updated 8 years ago
- Library and tools to access the Windows SuperFetch database format☆12Updated last month
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- Windows link file (shortcuts) examiner☆67Updated last year
- An updated C# port of X-Ways X-Tensions API.☆11Updated 7 years ago
- Tools for parsing Forensic images☆41Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Updated 7 years ago