bshavers / Mini-WinFELinks
Winbuilder Mini-WinFE
☆16Updated 2 years ago
Alternatives and similar repositories for Mini-WinFE
Users that are interested in Mini-WinFE are comparing it to the libraries listed below
Sorting:
- Short scripts which use the registry to enable or disable write-blocking for removable disks☆33Updated 2 years ago
- Windows 10 Live Information viewer☆37Updated 4 years ago
- Windows 10 (v1803+) ActivitiesCache.db parsers (SQLite, PowerShell, .EXE)☆196Updated 2 years ago
- Command line access to the Registry☆164Updated last month
- Registry Explorer bookmark definitions☆44Updated last year
- Powershell Event Tracing Toolbox☆77Updated 3 years ago
- Windows.EDB Browser☆60Updated 2 years ago
- MFT parser☆74Updated last year
- Documentation repository☆47Updated last year
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆41Updated last year
- Evtx Log (xml) Browser☆57Updated 2 years ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆54Updated 3 months ago
- A PowerShell module for incident response and threat hunting.☆38Updated last year
- Plugins for parsing CSV files in Timeline Explorer. This project allows for anyone to add more supported files (i,e. they get a Line #/ta…☆28Updated 9 months ago
- Software downloads☆109Updated 9 months ago
- ☆170Updated this week
- Win 10/11 related research☆197Updated 2 years ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆49Updated 3 weeks ago
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆43Updated last year
- Finds event logs between two time points. Useful for helpdesk/support/malware analysis.☆47Updated 6 years ago
- ☆76Updated this week
- PowerShell Script for Agentless Incident Response☆25Updated 7 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Updated 3 years ago
- Personal settings for X-Ways Forensics☆32Updated 3 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆17Updated 8 years ago
- Get all my software☆186Updated last month
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- StickyParser - Sticky Notes Forensic. A Windows Sticky Notes Praser (snt and plum.sqlite supported). Additional Feature: SQLite Recovery …☆18Updated 2 years ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Updated 7 months ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆22Updated 2 years ago