PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office
☆37Mar 15, 2023Updated 2 years ago
Alternatives and similar repositories for PS-TrustedDocuments
Users that are interested in PS-TrustedDocuments are comparing it to the libraries listed below
Sorting:
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆15Nov 25, 2021Updated 4 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last week
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- ☆18Jan 9, 2025Updated last year
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆44Feb 21, 2026Updated last week
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 6 months ago
- ☆14Mar 20, 2025Updated 11 months ago
- ☆61Jun 24, 2023Updated 2 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- ☆22Mar 4, 2025Updated 11 months ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- $MFT directory tree reconstruction & FILE record info☆326Oct 7, 2024Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated this week
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 5 months ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- ☆78Jan 15, 2026Updated last month
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 3 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago