cyb3rfox / MFTEntryCarver
Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if resident. It will also parse half broken entries as long as at least one $FN entry is ok.
☆21Updated 5 years ago
Alternatives and similar repositories for MFTEntryCarver:
Users that are interested in MFTEntryCarver are comparing it to the libraries listed below
- A set of tools for collecting forensic information☆26Updated 4 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- Generate YARA rules for OOXML documents.☆38Updated last year
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- Extract compressed memory pages from page-aligned data☆42Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆49Updated 5 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 5 months ago
- ☆47Updated 5 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 5 years ago
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Updated 4 years ago
- ☆15Updated 3 years ago
- Indicators of Normality☆12Updated 2 years ago
- ☆12Updated 3 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- ☆23Updated last year
- Listen for usb devices and automatically submit all files on device to cuckoo☆12Updated 7 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆26Updated last year