malware-unicorn / MFTparserLinks
Encase Script to parse harddrive for MFT data
☆16Updated 9 years ago
Alternatives and similar repositories for MFTparser
Users that are interested in MFTparser are comparing it to the libraries listed below
Sorting:
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Utility to decompress Linux swsusp hibernation file.☆29Updated 4 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- ☆16Updated 10 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A collection of Volatility Framework plugins.☆26Updated 12 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 6 years ago
- ☆68Updated 8 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- ☆30Updated 5 years ago