ernw / quarantine-formatsView external linksLinks
Documentation and parsers for different anti-virus quarantine formats.
☆42Dec 9, 2020Updated 5 years ago
Alternatives and similar repositories for quarantine-formats
Users that are interested in quarantine-formats are comparing it to the libraries listed below
Sorting:
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆116Jan 26, 2022Updated 4 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Dec 10, 2021Updated 4 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 4 months ago
- Multi-quarantine extractor☆52Feb 4, 2026Updated last week
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- A Generic WOW64 Process Blocker☆14Jul 16, 2021Updated 4 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 3 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- ☆18Jan 9, 2025Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- A python script developed to process Windows memory images based on triage type.☆264Nov 25, 2023Updated 2 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆72Feb 13, 2025Updated last year
- ☆36Jan 11, 2023Updated 3 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆551Sep 2, 2022Updated 3 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆20Aug 3, 2024Updated last year
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 5 months ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆113May 16, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated 11 months ago
- ☆12Nov 21, 2023Updated 2 years ago