Velocidex / SQLiteHunter
Hunt for SQLite files used by various applications
☆10Updated 2 months ago
Alternatives and similar repositories for SQLiteHunter:
Users that are interested in SQLiteHunter are comparing it to the libraries listed below
- Parser for Sdba memory pool tags☆17Updated 3 years ago
- ☆10Updated last year
- Just Another broken Registry Parser (JARP)☆16Updated 8 months ago
- ☆19Updated last year
- Parser for Windows PowerShell script block logs☆13Updated last month
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆10Updated 5 months ago
- Python web app for previewing data in a Chrome Profile Folder☆18Updated 6 months ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆15Updated 11 months ago
- Git for me to put all my forensics stuff☆21Updated 2 weeks ago
- Indicators of Normality☆12Updated 2 years ago
- Offline-viewer for registry files☆11Updated 4 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 years ago
- ☆12Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Registry Explorer bookmark definitions☆41Updated last month
- Windows registry samples☆23Updated 6 years ago
- NTFS file system specimens☆14Updated last year
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated 5 months ago
- Google Filestream Forensic Tool☆16Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- ☆22Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- Sigma rules converted for direct use with Zircolite☆11Updated this week
- Windows 10 Live Information viewer☆35Updated 3 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆20Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago