limbenjamin / nTimetoolsLinks
Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
☆50Updated 3 years ago
Alternatives and similar repositories for nTimetools
Users that are interested in nTimetools are comparing it to the libraries listed below
Sorting:
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆57Updated 9 months ago
- ☆92Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Python wrappers for mal_unpack☆36Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- ☆27Updated 3 years ago
- ProcDot Malware Sandbox☆24Updated 7 months ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated 5 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- AdHoc solutions☆48Updated last year
- A repo to house files for our blogposts on blog.nviso.eu☆72Updated 4 months ago
- ☆34Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆34Updated 3 years ago
- ☆11Updated 3 years ago
- ☆45Updated last year
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆14Updated 3 months ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- Manipulate timestamps on NTFS☆51Updated 10 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago