mgreen27 / Invoke-BitsParserLinks
Sharing my BITS
☆13Updated 7 years ago
Alternatives and similar repositories for Invoke-BitsParser
Users that are interested in Invoke-BitsParser are comparing it to the libraries listed below
Sorting:
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆77Updated last year
- ☆39Updated 6 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- ☆13Updated 3 years ago
- Invoke-LiveResponse☆149Updated 3 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Updated 6 years ago
- Parser for Windows PowerShell script block logs☆99Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆41Updated 3 years ago
- Publicly shareable windows event log message data☆27Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆126Updated 3 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 7 months ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- ☆35Updated 11 months ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Registry Explorer bookmark definitions☆43Updated 9 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- ☆33Updated 3 years ago
- incident response scripts☆19Updated 6 years ago
- Finds event logs between two time points. Useful for helpdesk/support/malware analysis.☆47Updated 6 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 4 years ago
- An advanced parser for INDX records☆28Updated 6 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆21Updated 4 years ago
- ☆42Updated 4 years ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆22Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Updated 2 months ago
- ☆77Updated 6 years ago
- ☆42Updated 2 years ago
- Tools from WFA 4/e, timeline tools, etc.☆141Updated last year
- Library of python scripts to apply Data Science in several forensics artifacts☆31Updated 5 years ago