strontic / xcyclopediaLinks
Encyclopedia for Executables
☆456Updated 3 years ago
Alternatives and similar repositories for xcyclopedia
Users that are interested in xcyclopedia are comparing it to the libraries listed below
Sorting:
- C# based evtx parser with lots of extras☆332Updated last month
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆721Updated 4 months ago
- $MFT directory tree reconstruction & FILE record info☆314Updated last year
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆181Updated this week
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆535Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆319Updated 2 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆237Updated 11 months ago
- RegRipper3.0☆652Updated 10 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆747Updated 6 months ago
- A wireshark plugin to instrument ETW☆574Updated 3 years ago
- Parses $MFT from NTFS file systems☆268Updated 5 months ago
- Collection of private Yara rules.☆372Updated this week
- Sophos-originated indicators-of-compromise from published reports☆633Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- Event Tracing For Windows (ETW) Resources☆404Updated 3 weeks ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- ☆150Updated last year
- Get all my software☆174Updated 4 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆303Updated 3 years ago
- Tools for hunting for threats.☆597Updated 6 months ago
- Prefetch Explorer Command Line☆272Updated 9 months ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆641Updated last week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆631Updated last year
- Command line access to the Registry☆158Updated 2 weeks ago
- Sysmon configuration file template with default high-quality event tracing☆521Updated last month
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆827Updated 10 months ago
- Windows Registry Knowledge Base☆186Updated 2 weeks ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆427Updated 4 years ago