☆129Feb 19, 2026Updated last month
Alternatives and similar repositories for hashr
Users that are interested in hashr are comparing it to the libraries listed below
Sorting:
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- http://moaistory.blogspot.com/2018/10/winsearchdbanalyzer.html☆127Jul 20, 2024Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- ☆18Mar 26, 2025Updated 11 months ago
- The backend server handling API requests and task management☆59Updated this week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- ☆14Oct 24, 2024Updated last year
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Automation and Scaling of Digital Forensics Tools☆787Updated this week
- Documentation and scripts to properly enable Windows event logs.☆673Oct 3, 2025Updated 5 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆648Nov 7, 2025Updated 4 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 3 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Feb 3, 2023Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆87Mar 11, 2026Updated last week
- A tool to help forensicate offline docker acquisitions☆553Oct 4, 2024Updated last year
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Windows Event Log "Microsoft-Windows-Partition%4Diagnostic.evtx" parser and devices' VSNs extractor.☆20Nov 28, 2023Updated 2 years ago
- OneDrive log .ODL reader☆161Nov 3, 2024Updated last year
- ☆152Jun 5, 2024Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆118Oct 8, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week