Parses IE's Automatic Crash Recovery Files
☆16Feb 3, 2017Updated 9 years ago
Alternatives and similar repositories for parseRS
Users that are interested in parseRS are comparing it to the libraries listed below
Sorting:
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Mar 19, 2013Updated 12 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated last year
- Windows Thingies in Python for live use.☆24Apr 22, 2019Updated 6 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Chrome Logs Events and Protobuf Parser☆39Dec 13, 2022Updated 3 years ago
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 11 months ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- ☆12Dec 14, 2016Updated 9 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- A C++ library and tools providing easy access to the retdec.com decompilation service through their REST API.☆10Jun 17, 2018Updated 7 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- OSCP material tools and helpful scripts.☆11Mar 14, 2025Updated 11 months ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- An Android Application for making VoIP calls over FreeSWITCH server☆12Jun 4, 2015Updated 10 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Python script for carving Bitlocker VMK keys☆25Feb 4, 2026Updated 3 weeks ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- ☆10Nov 21, 2023Updated 2 years ago