kkoha / EvtxCarv
recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space
☆13Updated 10 years ago
Alternatives and similar repositories for EvtxCarv
Users that are interested in EvtxCarv are comparing it to the libraries listed below
Sorting:
- Windows device tree walker☆15Updated 6 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- Handy WMI query tool.☆12Updated 8 years ago
- Windows registry files interactive viewer☆9Updated 8 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 12 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 10 years ago
- Windows hidden thread suspend POC with code injection☆12Updated 7 years ago
- windows内核小工具,包含APP和driver☆11Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆17Updated 10 years ago
- Common Malware Techniques☆13Updated 2 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 9 years ago
- ☆10Updated 10 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Updated 13 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆16Updated 9 years ago
- ☆14Updated 9 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Notes my learning steps about Windows-NT☆23Updated 7 years ago
- Lists work items being queued currently.☆14Updated 9 years ago
- ☆12Updated 10 years ago
- hooking KiUserApcDispatcher☆24Updated 8 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- ☆7Updated 8 years ago
- PE Infector/Cryptor source code☆15Updated 8 years ago
- ☆10Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- ☆13Updated 6 years ago
- ☆14Updated 12 years ago