tedsmith / yaffi
Yet Another Free Forensic Imager
☆11Updated 7 years ago
Alternatives and similar repositories for yaffi:
Users that are interested in yaffi are comparing it to the libraries listed below
- VirusTotal tools☆90Updated 4 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38Updated 7 years ago
- Just a collection of scripts☆40Updated 4 years ago
- Digital Forensics Windows Registry (dfWinReg)☆51Updated 3 months ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 8 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- PowerShell based Live Response tool☆12Updated 9 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆27Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- recover deleted information from sqlite files.☆62Updated 8 years ago
- AuditParser☆59Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 8 months ago
- Recover event log entries from an image by heurisitically looking for record structures.☆27Updated 9 years ago
- My metasploit modules☆22Updated 9 years ago
- An NTFS journal parser☆82Updated 9 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- ircollect☆31Updated 11 years ago
- CyberGate Protector☆11Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Malware Control Monitor☆88Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Updated 13 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- ☆68Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago