itsreallynick / office-crackros
Crack your macros like the math pros.
☆33Updated 8 years ago
Alternatives and similar repositories for office-crackros:
Users that are interested in office-crackros are comparing it to the libraries listed below
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- ☆10Updated 4 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Presentation materials for talks I've given.☆20Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 3 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- ☆52Updated 6 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Mass Triage Tools☆20Updated 2 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- ☆16Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago