kkoha / EvtxCarv
recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space
☆13Updated 10 years ago
Alternatives and similar repositories for EvtxCarv:
Users that are interested in EvtxCarv are comparing it to the libraries listed below
- Handy WMI query tool.☆12Updated 8 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Common Malware Techniques☆13Updated last year
- ☆10Updated 10 years ago
- Windows device tree walker☆15Updated 6 years ago
- Windows registry files interactive viewer☆9Updated 7 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- ☆14Updated 9 years ago
- C++ class for ini parser☆8Updated 8 years ago
- Notes my learning steps about Windows-NT☆23Updated 7 years ago
- Event Tracing for Windows Custom Events☆21Updated 10 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago
- Google Drive windows virtual unit☆9Updated 11 years ago
- windows内核小工具,包含APP和driver☆11Updated 10 years ago
- windows ntfs legasy file system filterUpdated 9 years ago
- does reflective dll injection☆8Updated 11 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 11 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 8 years ago
- ☆17Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 5 years ago
- ☆12Updated 9 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- An idea in hooking APIs by replacing calls that lead to them☆1Updated 2 years ago
- ☆7Updated 7 years ago