fireeye / BitsParser
☆144Updated 8 months ago
Alternatives and similar repositories for BitsParser:
Users that are interested in BitsParser are comparing it to the libraries listed below
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- ☆86Updated last year
- Automagically extract forensic timeline from volatile memory dump☆126Updated 9 months ago
- A collection of tools to interact with Microsoft Security Response Center API☆95Updated last year
- Digital Forensics Artifacts Knowledge Base☆77Updated 8 months ago
- Command line access to the Registry☆135Updated 3 weeks ago
- A repository that maps API calls to Sysmon Event ID's.☆117Updated 2 years ago
- ☆65Updated 2 weeks ago
- Sysmon EDR POC Build within Powershell to prove ability.☆219Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆150Updated 3 years ago
- My conference presentations☆66Updated last year
- Powershell Event Tracing Toolbox☆73Updated 2 years ago
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆79Updated 7 months ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆60Updated last month
- Anything Sysmon related from the MSTIC R&D team☆149Updated 8 months ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- A PowerShell incident response script for quick triage☆78Updated 2 years ago
- ☆5Updated 3 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆93Updated this week
- Random hunting ordiented yara rules☆95Updated last year
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆112Updated 3 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated 11 months ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆155Updated 2 weeks ago
- ☆130Updated last year
- ☆232Updated 9 months ago