fireeye / pywintraceLinks
ETW Python Library
☆288Updated 2 years ago
Alternatives and similar repositories for pywintrace
Users that are interested in pywintrace are comparing it to the libraries listed below
Sorting:
- Live hunting of code injection techniques☆383Updated 6 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆310Updated last year
- Library and tools to access the Windows XML Event Log (EVTX) format☆213Updated 11 months ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆215Updated 5 years ago
- Generating YARA rules based on binary code☆215Updated 3 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- A tool for de-obfuscating PowerShell scripts☆70Updated 6 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- ☆219Updated 7 years ago
- A YARA-integrated process denial framework for Windows☆396Updated 5 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆264Updated 3 years ago
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆162Updated 8 months ago
- Incident Response & Digital Forensics Debugging Extension☆385Updated 6 years ago
- ☆427Updated 2 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆254Updated 2 years ago
- A tool to detect and crash Cuckoo Sandbox☆296Updated last year
- Official VirusTotal plugin for IDA Pro☆158Updated this week
- Parse YARA rules and operate over them more easily.☆191Updated 6 months ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆275Updated 5 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- Ruxcon2016 POC Code☆140Updated 8 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆182Updated 7 years ago
- ☆97Updated 4 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Event Trace Log file parser in pure Python☆144Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆277Updated 3 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆157Updated 3 years ago