limbenjamin / nTimetoolsLinks
Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
☆53Updated 4 years ago
Alternatives and similar repositories for nTimetools
Users that are interested in nTimetools are comparing it to the libraries listed below
Sorting:
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Manipulate timestamps on NTFS☆53Updated 11 years ago
- ☆11Updated 4 years ago
- ☆36Updated 2 years ago
- ☆94Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated last week
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- AdHoc solutions☆48Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- ProcDot Malware Sandbox☆25Updated 4 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆22Updated 4 months ago
- ☆61Updated last year
- ☆23Updated 2 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆74Updated 8 months ago
- ☆38Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- ☆45Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆23Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- General Content☆26Updated 2 weeks ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago