libyal / libevtx
Library and tools to access the Windows XML Event Log (EVTX) format
☆195Updated 4 months ago
Alternatives and similar repositories for libevtx:
Users that are interested in libevtx are comparing it to the libraries listed below
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆212Updated 5 years ago
- ☆422Updated last year
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 6 years ago
- Live hunting of code injection techniques☆380Updated 5 years ago
- Signature engine for all your logs☆167Updated last year
- Windows registry file format specification☆337Updated 6 years ago
- ETW Python Library☆276Updated last year
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 4 years ago
- ☆275Updated last year
- Yet another library library (and tools)☆205Updated last month
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆286Updated 9 months ago
- Tool suite for inspecting NTFS artifacts.☆218Updated last year
- Golang Parser for Microsoft Event Logs☆101Updated last month
- AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10☆114Updated last month
- Windows Prefetch parser. Supports all known versions from Windows XP to Windows 10.☆111Updated last month
- An AFF4 C++ implementation.☆195Updated last year
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆148Updated 3 years ago
- An NTFS/FAT parser for digital forensics & incident response☆198Updated 3 months ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- A YARA-integrated process denial framework for Windows☆397Updated 5 years ago
- Parse evtx files and detect use of the DanderSpritz eventlogedit module☆148Updated 7 years ago
- ☆297Updated 4 years ago
- Automatic YARA rule generation for Malpedia☆157Updated 2 years ago
- A tool for de-obfuscating PowerShell scripts☆67Updated 5 years ago
- Library and tools to access the Windows Prefetch File (SCCA) format.☆72Updated last month
- Lnk Explorer Command line edition!!☆289Updated last month
- Generating YARA rules based on binary code☆205Updated 3 years ago
- Reconstruct process trees from event logs☆147Updated 4 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago