dhondta / AppmemDumper
Forensics triage tool relying on Volatility and Foremost
☆26Updated last year
Alternatives and similar repositories for AppmemDumper:
Users that are interested in AppmemDumper are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- ☆20Updated 4 years ago
- ☆30Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Basic file metadata gathering script☆21Updated this week
- Simple Live Data Collection Tool☆21Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- ☆12Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- ☆9Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆16Updated last year
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Batch scripts to capture volatile and log information from a target system☆19Updated 10 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ☆24Updated last year
- Automated Static Analysis Framework☆9Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- ☆36Updated 5 years ago