Volatility plugin to search for all Autostart Extensibility Points (AESPs)
☆10May 16, 2024Updated last year
Alternatives and similar repositories for winesap
Users that are interested in winesap are comparing it to the libraries listed below
Sorting:
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Notify Alert to Google Chat Gsuite☆11Mar 31, 2022Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- My config for Home Assistant running on Linux 18.04 LTS in Docker.☆11Nov 5, 2019Updated 6 years ago
- Psinfo is a Volatility plugin which collects the process related information from the VAD (Virtual Address Descriptor) and PEB (Process E…☆39Sep 24, 2016Updated 9 years ago
- ☆12May 8, 2020Updated 5 years ago
- CSMTP allow you to send email via command line and save message in sent folder☆12Jan 21, 2018Updated 8 years ago
- Jenkins plugin for AWS CodeDeploy☆15Oct 18, 2023Updated 2 years ago
- ☆16Oct 29, 2023Updated 2 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Borderlands2 hacker use UE3 SDK☆10Sep 18, 2019Updated 6 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Compile time string XOR for visual studio 2010-2013☆10May 31, 2018Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- ☆15Oct 4, 2012Updated 13 years ago
- Keeping your infrastructure clean since 2018☆12Mar 14, 2024Updated 2 years ago
- Inquisitor is a hardware testing and certification system, suitable for both enterprise and home use. It is customizable, modular, and av…☆15Oct 31, 2013Updated 12 years ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago
- A bridge from dbus ScreenSaver inhibit to systemd/logind idle inhibit.☆24Mar 27, 2024Updated last year
- Lambda function to be called in CloudWatch when GuardDuty sends logs to CloudWatch. This script will write the malicious IP to a dedicate…☆14May 13, 2023Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Autoruns plugin for the Volatility framework☆123Jul 18, 2019Updated 6 years ago
- The files and firmware for the Shark Bait wireless pumping system.☆13Jul 28, 2019Updated 6 years ago
- Big Cheat☆15May 4, 2017Updated 8 years ago
- Globe 3D module for Icinga Web 2☆12Nov 24, 2021Updated 4 years ago
- Incident Response and Forensic on AWS☆20May 19, 2020Updated 5 years ago
- Dimensional Drawings for the "Fire Plug" Padlock Core Tool☆18Aug 22, 2022Updated 3 years ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆24Aug 4, 2023Updated 2 years ago
- Lets you quickly start and stop the Windows Services you care about. (C#, WPF)☆15Oct 25, 2018Updated 7 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- ☆12Dec 17, 2016Updated 9 years ago
- Point of light effects with an Adafruit NeoPixel matrix☆14Jan 26, 2021Updated 5 years ago