harelsegev / INDXRipperLinks
Carve file metadata from NTFS index ($I30) attributes
☆70Updated last year
Alternatives and similar repositories for INDXRipper
Users that are interested in INDXRipper are comparing it to the libraries listed below
Sorting:
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆54Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆113Updated 3 years ago
- USN Journal full path builder☆61Updated 11 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 3 months ago
- JPCERT/CC public YARA rules repository☆110Updated 9 months ago
- ☆38Updated 4 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆103Updated 5 months ago
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆42Updated 10 months ago
- ☆88Updated last month
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Quick ESXi Log Parser☆25Updated this week
- MFT parser☆68Updated 7 months ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆41Updated 3 years ago
- ☆47Updated 8 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆57Updated 2 months ago
- ☆19Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Recycle bin artifact parser☆50Updated 7 months ago
- Powershell sandboxing utility☆19Updated 2 weeks ago
- Just Another broken Registry Parser (JARP)☆16Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆21Updated 6 months ago
- ☆19Updated 8 months ago
- ☆68Updated 3 weeks ago
- Dump quarantined files from Windows Defender☆66Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated last year
- macOS Artifacts☆31Updated 6 months ago
- Detection Engineering with YARA☆87Updated last year
- The core backend server handling API requests and task management☆46Updated last week