airbus-cert / dnYaraLinks
A multi-platform .Net wrapper library for the native Yara library.
☆38Updated 2 years ago
Alternatives and similar repositories for dnYara
Users that are interested in dnYara are comparing it to the libraries listed below
Sorting:
- ☆218Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- Parses the WMI object database....looking for persistence☆32Updated 5 years ago
- A rewrite of mactime, a bodyfile reader☆40Updated last year
- Reconstruct process trees from event logs☆146Updated 5 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆119Updated last year
- Full featured, offline Registry parser in C#☆231Updated last month
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Windows Prefetch parser. Supports all known versions from Windows XP to Windows 10.☆114Updated 7 months ago
- Invoke-LiveResponse☆149Updated 3 years ago
- Yet another registry parser☆133Updated 3 years ago
- A modern Python-3-based alternative to RegRipper☆196Updated 4 months ago
- .NET wrapper for libyara built in C++ CLI used to easily incorporate yara into .NET projects☆56Updated last year
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆195Updated 5 months ago
- Python script for extracting USB information from Windows registry hives☆128Updated 5 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- Command line access to the Registry☆153Updated 3 weeks ago
- Binary commandline executable to parse ETL files☆67Updated 7 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆37Updated last year
- A repository that maps API calls to Sysmon Event ID's.☆122Updated 2 years ago
- ☆134Updated 6 years ago
- VSCode extension for the YARA pattern matching language☆64Updated last year
- Tool to parse SRU database☆24Updated 7 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆17Updated 2 years ago
- .NET runtime inspector☆271Updated 6 years ago