Tools and Binaries to use with KAPE
☆13Aug 13, 2019Updated 6 years ago
Alternatives and similar repositories for KAPE_Tools
Users that are interested in KAPE_Tools are comparing it to the libraries listed below
Sorting:
- ☆10Nov 21, 2023Updated 2 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- no longer maintained☆18Feb 22, 2018Updated 8 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- ☆11Oct 28, 2016Updated 9 years ago
- Tools from WFA 4/e, timeline tools, etc.☆145Feb 29, 2024Updated 2 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- An interactive command-line deauther for macOS.☆73Jan 18, 2019Updated 7 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Parses RecentFileCacheParser.bcf files☆30Feb 2, 2025Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- Logstash configuration files for analyzing various types of logs☆25Dec 9, 2016Updated 9 years ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- ☆29Nov 14, 2022Updated 3 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Jun 6, 2023Updated 2 years ago
- A PowerShell module for incident response and threat hunting.☆38May 23, 2024Updated last year
- A timestamp and date decoder written for python 3☆41Jan 22, 2026Updated last month
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- ADB Based Acquisition Tool for Android Forensics☆43Mar 30, 2021Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year