AuditParser
☆60Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for AuditParser
Users that are interested in AuditParser are comparing it to the libraries listed below
Sorting:
- ☆108Jul 18, 2017Updated 8 years ago
- ☆109Nov 21, 2013Updated 12 years ago
- ☆207May 3, 2023Updated 2 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Tools from WFA 4/e, timeline tools, etc.☆145Feb 29, 2024Updated 2 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- parser for Google search strings☆40Sep 14, 2019Updated 6 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- OS Lockdown☆13Nov 21, 2017Updated 8 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Feb 21, 2026Updated last week
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- Public Landing Page☆16Jan 7, 2023Updated 3 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Automatically disable and remove malware and blacklisted piracy markets to help support developers and themers☆12Oct 13, 2015Updated 10 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Kali Linux fresh installation setup scripts.☆14Feb 10, 2017Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Parser for Windows Scheduled Task files.☆13Apr 26, 2023Updated 2 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year