rjhansen / nsrllookupLinks
Checks with NSRL RDS servers looking for for hash matches
☆115Updated 4 years ago
Alternatives and similar repositories for nsrllookup
Users that are interested in nsrllookup are comparing it to the libraries listed below
Sorting:
- stoQ Public Plugins☆71Updated 2 years ago
- ☆84Updated 3 years ago
- Yet another registry parser☆136Updated 3 years ago
- Reconstruct process trees from event logs☆147Updated 5 years ago
- Python IOC Editor☆64Updated 10 years ago
- Static analysis tools for Microsoft Office Open XML files and documents☆72Updated 8 years ago
- Example programs used in the automating DFIR series☆63Updated 6 years ago
- Python script for extracting USB information from Windows registry hives☆128Updated 6 years ago
- Windows Live Artifacts Acquisition Script☆192Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- ☆82Updated 9 years ago
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆124Updated 2 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆120Updated last year
- Community modules for FAME☆65Updated 2 months ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- openioc_scan Volatility Framework plugin☆43Updated 9 years ago
- AuditParser☆60Updated 12 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Volatility plugins created by the author☆44Updated 10 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- Yara rules for malware families seen as part of targeted threats project☆142Updated 9 years ago
- My Yara Rules Collection☆53Updated 9 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆202Updated 9 months ago