fbruzzaniti / Capture-PyLinks
Capture-Py is a malware analysis tool that makes a copy of any files deleted or modified in a given directory and sub-directories. It was intended to be a subsitute for Capture-Bat on 64bit systems.
☆23Updated 8 years ago
Alternatives and similar repositories for Capture-Py
Users that are interested in Capture-Py are comparing it to the libraries listed below
Sorting:
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Binary commandline executable to parse ETL files☆67Updated 7 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 5 months ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Standardized Malware Analysis Tool☆53Updated 4 years ago
- VSCode extension for the YARA pattern matching language☆64Updated last year
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- Win32 utility for auditing TCP connections☆56Updated 4 years ago
- OSSEM Modular☆27Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆56Updated 3 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated 6 months ago
- Mass Triage Tools☆20Updated 4 months ago
- LNK to JSON☆14Updated 6 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 5 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Parses the WMI object database....looking for persistence☆32Updated 5 years ago
- isodump - ISO dump utility☆40Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 6 years ago
- ☆39Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago