tokesr / usb_investigatorLinks
☆9Updated 5 years ago
Alternatives and similar repositories for usb_investigator
Users that are interested in usb_investigator are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆16Updated last year
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 6 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated 9 months ago
- isodump - ISO dump utility☆40Updated 5 years ago
- ☆12Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆11Updated 6 years ago
- ☆12Updated 7 years ago
- Parser for Sdba memory pool tags☆18Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 3 years ago
- NTFS file system specimens☆13Updated last year
- ☆14Updated 7 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- ☆11Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Git for me to put all my forensics stuff☆22Updated 4 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Tool for analysis of Windows Prefetch files☆26Updated 6 years ago