dnlongen / RegLister
Recurse through a registry, identifying values with large data -- a registry malware hunter
☆44Updated 8 years ago
Alternatives and similar repositories for RegLister:
Users that are interested in RegLister are comparing it to the libraries listed below
- Some IR notes☆73Updated 8 years ago
- Some dfir stuff☆31Updated 3 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- Various scrips☆12Updated 2 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆86Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- A Windows Event Processing Utility☆46Updated 7 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- Volatility Plugins☆21Updated 9 years ago
- ☆9Updated 7 years ago
- Manage VT Alerts☆62Updated 8 years ago
- ☆16Updated 10 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- ☆36Updated 8 years ago
- openioc_scan Volatility Framework plugin☆43Updated 9 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Updated 8 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- onigiri - remote malware triage script☆24Updated 9 years ago
- Collection of my Python Scripts☆41Updated 4 years ago
- ☆52Updated 6 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago