mutedmouse / ta-volatilityLinks
Technical add-on to ingest json formatted volatility memory analysis plugin outputs
☆13Updated 7 years ago
Alternatives and similar repositories for ta-volatility
Users that are interested in ta-volatility are comparing it to the libraries listed below
Sorting:
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Tool to parse SRU database☆24Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 3 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Mass Triage Tools☆20Updated 4 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- ☆39Updated 5 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- Registry Miner☆14Updated 7 years ago
- Various scrips☆12Updated 2 years ago
- Tools to search through massive amounts of data☆21Updated 7 months ago
- Site for IWS book content☆18Updated 6 years ago
- Some dfir stuff☆31Updated 3 years ago
- ☆9Updated 7 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- ☆17Updated 7 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Updated 2 years ago
- Log Examination Tool☆26Updated 8 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Updated 7 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆50Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- ☆32Updated 7 months ago
- Splunk app for Threat hunting☆15Updated 6 years ago