kacos2000 / Prefetch-Browser
Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's
☆61Updated 4 months ago
Alternatives and similar repositories for Prefetch-Browser:
Users that are interested in Prefetch-Browser are comparing it to the libraries listed below
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆40Updated 7 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Repo containing my public talks☆23Updated last year
- ☆45Updated last year
- Contains compiled binaries of Volatility☆33Updated 3 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- ☆14Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- a tiny program to consume from ETW providers for research☆47Updated 4 months ago
- ☆33Updated 3 years ago
- Windows.EDB Browser☆56Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- Detection rule validation☆41Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- Quick ESXi Log Parser☆19Updated 4 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Reverse Engineering and Debugging Malware☆30Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- ☆19Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆31Updated 6 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆20Updated last year
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆24Updated 8 months ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆33Updated 3 years ago