limbenjamin / nTimetools
Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
☆45Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for nTimetools
- A repo to house files for our blogposts on blog.nviso.eu☆65Updated 2 months ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆26Updated 2 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆56Updated 2 years ago
- ☆11Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- ☆34Updated last year
- ☆44Updated last year
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆91Updated 2 years ago
- ☆10Updated 4 years ago
- THOR Thunderstorm Collectors☆24Updated 2 months ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- Smart Card PIN swiping DLL☆74Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- ☆22Updated 11 months ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Self-healing RAT utilizing libp2p☆86Updated 3 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- ☆37Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆49Updated 3 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆33Updated 11 months ago
- Repo containing my public talks☆22Updated last year