fbruzzaniti / Capture-PyLinks
Capture-Py is a malware analysis tool that makes a copy of any files deleted or modified in a given directory and sub-directories. It was intended to be a subsitute for Capture-Bat on 64bit systems.
☆27Updated 8 years ago
Alternatives and similar repositories for Capture-Py
Users that are interested in Capture-Py are comparing it to the libraries listed below
Sorting:
- Lazy Office Analyzer☆121Updated 8 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- ☆54Updated 5 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- Yet another registry parser☆138Updated 3 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated 11 months ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- LNK to JSON☆14Updated 6 years ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- Binary commandline executable to parse ETL files☆68Updated 7 years ago
- VSCode extension for the YARA pattern matching language☆63Updated 2 years ago
- Random hunting ordiented yara rules☆98Updated 2 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Updated last year
- Miscellaneous Scripts☆17Updated 5 years ago
- Extract compressed memory pages from page-aligned data☆47Updated 7 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- Extract common Windows artifacts from source images and VSCs☆63Updated 4 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Updated 7 years ago
- Validates yara rules and tries to repair the broken ones.☆41Updated 5 years ago
- A DFVFS Backed Forensic Viewer☆41Updated 5 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Tools for parsing Forensic images☆41Updated 7 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 4 years ago