jschicht / SetMace
Manipulate timestamps on NTFS
☆50Updated 10 years ago
Alternatives and similar repositories for SetMace:
Users that are interested in SetMace are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 10 months ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 2 months ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 2 weeks ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- ☆44Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Standardized Malware Analysis Tool☆52Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Hunt malware with Volatility☆47Updated 9 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆39Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆59Updated 2 months ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- ☆38Updated 3 years ago
- ☆21Updated 4 months ago
- ☆15Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 10 months ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆16Updated 6 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆14Updated last year
- ☆86Updated last year
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆72Updated last year
- Miscellaneous Scripts☆17Updated 4 years ago