tedsmith / yaffiLinks
Yet Another Free Forensic Imager
☆11Updated 7 years ago
Alternatives and similar repositories for yaffi
Users that are interested in yaffi are comparing it to the libraries listed below
Sorting:
- VirusTotal tools☆91Updated 4 years ago
- CyberGate Protector☆11Updated 8 years ago
- Vanilla version of Bully☆10Updated 8 years ago
- Dump and parse embedded certificates from Windows binaries☆11Updated 13 years ago
- Dragon Sandbox☆78Updated 12 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆28Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆10Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files☆16Updated 11 months ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- ☆12Updated 8 years ago
- ☆35Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆15Updated 8 years ago
- Just a collection of scripts☆40Updated 5 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Digital Forensics Windows Registry (dfWinReg)☆52Updated 6 months ago
- SQL injection in Neutrino panel☆8Updated 10 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 9 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆23Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- The educational Animus malware☆18Updated 5 years ago
- Powershell tool to download malware samples.☆12Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago