libyal / libevtLinks
Library and tools to access the Windows Event Log (EVT) format
☆60Updated last year
Alternatives and similar repositories for libevt
Users that are interested in libevt are comparing it to the libraries listed below
Sorting:
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- ☆13Updated 9 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- Pure Python parser for data encoded by .NET's BinaryFormatter☆54Updated 7 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆27Updated 10 years ago
- Modified edition of cuckoomon☆51Updated 7 years ago
- YARA rules for use with ProcFilter☆88Updated 8 years ago
- Simple NTFS crawler.☆56Updated 8 years ago
- NTFS parser, plus linking capabilites between MFT LogFile and UsnJrnl☆38Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Network detector for Winnti malware☆21Updated 7 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Updated 6 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Updated 2 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Updated 8 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆109Updated 4 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 8 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- Yaras Random☆22Updated 6 years ago
- ☆43Updated 7 years ago
- An NTFS journal parser☆83Updated 9 years ago
- Extract GUIDs from .NET assemblies☆21Updated 9 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- ☆52Updated 7 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆56Updated 10 years ago
- Binary commandline executable to parse ETL files☆68Updated 7 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago