libyal / libmsiecfLinks
Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files
☆16Updated last month
Alternatives and similar repositories for libmsiecf
Users that are interested in libmsiecf are comparing it to the libraries listed below
Sorting:
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated last month
- Library for Windows XML Event Log (EVTX) data types☆18Updated last month
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Server for receiving autorun data from the clients☆13Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Library and tools to access the Windows SuperFetch database format☆12Updated last month
- Exploit kit analyzer☆22Updated 10 years ago
- Random Code Store☆17Updated 2 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Updated 10 years ago
- ☆10Updated 8 years ago
- Network detector for Winnti malware☆21Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- onigiri - remote malware triage script☆24Updated 10 years ago
- Library and tools to access the Windows Event Log (EVT) format☆60Updated last month
- ☆21Updated 9 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- ransomware_begone☆42Updated 9 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 9 years ago
- Summit Route End Point Protection - Server code☆11Updated 9 years ago
- Post-explotation Hacks☆14Updated 7 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 11 years ago
- Summit Route End Point Protection - Client code☆16Updated 9 years ago