joesecurity / DocBleachShell
DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool into the Microsoft Windows Shell Handler.
☆21Updated 2 years ago
Related projects: ⓘ
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated 11 months ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 6 years ago
- ☆45Updated this week
- ☆11Updated this week
- Some rules, scripts of some use to us☆9Updated this week
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆22Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆15Updated this week
- A Windows Event Processing Utility☆46Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆39Updated 5 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- ☆16Updated 9 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆21Updated 6 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- ☆19Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆39Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆32Updated 4 years ago
- Registry Miner☆14Updated 6 years ago
- ☆14Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- RegRipper wrapper for simplified bulk parsing or registry hives☆10Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- ☆19Updated this week
- ☆16Updated this week
- Konrads' Pen-Ultimate (Windows) Log File Parser☆13Updated 2 years ago
- onigiri - remote malware triage script☆24Updated 8 years ago
- ☆16Updated this week
- Detect malicious domain, Blablablablabla☆26Updated 7 years ago
- Network sinkhole for isolated malware analysis☆39Updated 6 years ago