Site for IWS book content
☆17Oct 28, 2018Updated 7 years ago
Alternatives and similar repositories for IWSBook
Users that are interested in IWSBook are comparing it to the libraries listed below
Sorting:
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- ☆31Feb 15, 2017Updated 9 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Tools from WFA 4/e, timeline tools, etc.☆145Feb 29, 2024Updated 2 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Mac osx forensics tools☆12Nov 28, 2020Updated 5 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Feb 19, 2019Updated 7 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 11 months ago
- ☆24Aug 30, 2019Updated 6 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- USN to JSON☆22Apr 4, 2020Updated 5 years ago
- Golang Parser for Microsoft Event Logs☆105Nov 7, 2025Updated 3 months ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Files vetted, and approved for public release☆55Nov 30, 2023Updated 2 years ago
- Binary commandline executable to parse ETL files☆69Jun 7, 2018Updated 7 years ago
- A fork of The Sleuthkit with Pooled Storage and APFS support. See https://www.youtube.com/watch?v=k1XPillJ7aw for more info and usage.☆26Oct 27, 2019Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- Comae Hibernation File Decompressor☆156Apr 1, 2023Updated 2 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago