Recurse through a registry, identifying values with large data -- a registry malware hunter
☆45Sep 12, 2016Updated 9 years ago
Alternatives and similar repositories for RegLister
Users that are interested in RegLister are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- An NTFS journal parser☆80Mar 3, 2016Updated 10 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆96Mar 31, 2017Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Python script to parse the NTFS USN Journal☆117Jul 15, 2022Updated 3 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Python script for extracting USB information from Windows registry hives☆128Aug 14, 2019Updated 6 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Jun 4, 2017Updated 8 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- List of penetration testing tools.☆23Mar 25, 2020Updated 6 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Tool to extract the $UsnJrnl from an NTFS volume☆109Jul 30, 2019Updated 6 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- PS scripts for checking your certificate store, and code-signing status of executables.☆17Nov 25, 2015Updated 10 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 12 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago