fbruzzaniti / Capture-PyLinks
Capture-Py is a malware analysis tool that makes a copy of any files deleted or modified in a given directory and sub-directories. It was intended to be a subsitute for Capture-Bat on 64bit systems.
☆26Updated 8 years ago
Alternatives and similar repositories for Capture-Py
Users that are interested in Capture-Py are comparing it to the libraries listed below
Sorting:
- Lazy Office Analyzer☆122Updated 8 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated 10 months ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- ☆54Updated 5 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- Random hunting ordiented yara rules☆98Updated 2 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Malware similarity platform with modularity in mind.☆79Updated 4 years ago
- Tools for parsing Forensic images☆41Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆63Updated 4 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Updated 7 years ago
- LNK to JSON☆14Updated 6 years ago
- Binary commandline executable to parse ETL files☆68Updated 7 years ago
- Community modules for FAME☆65Updated 3 weeks ago
- ☆39Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 4 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- Hunt malware with Volatility☆47Updated 5 months ago
- VSCode extension for the YARA pattern matching language☆63Updated last year
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆58Updated 3 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Yet another registry parser☆138Updated 3 years ago
- A modern Python-3-based alternative to RegRipper☆205Updated 9 months ago
- A YARA Rule Performance Measurement Tool☆61Updated last year
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Windows link file (shortcuts) examiner☆67Updated last year
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago