aurel26 / wer-serverLinks
WER Server
☆18Updated 8 years ago
Alternatives and similar repositories for wer-server
Users that are interested in wer-server are comparing it to the libraries listed below
Sorting:
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A Windows Event Processing Utility☆46Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Updated 9 years ago
- Volatility Plugins☆21Updated 10 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- s(4)u for Windows☆48Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Command-line Interface for Binar.ly☆38Updated 8 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Some IR notes☆73Updated 8 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆143Updated 5 years ago
- Manage VT Alerts☆62Updated 8 years ago
- openioc_scan Volatility Framework plugin☆43Updated 9 years ago
- Various scrips☆12Updated 2 years ago
- onigiri - remote malware triage script☆24Updated 9 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆42Updated 10 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- ☆19Updated 6 years ago
- ☆52Updated 6 years ago
- PE Import Hash Generator☆80Updated 8 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Emulating Virtual Environment to stay protected against advanced malware☆100Updated 6 years ago
- ☆82Updated 9 years ago