tokesr / usb_investigator
☆9Updated 5 years ago
Alternatives and similar repositories for usb_investigator:
Users that are interested in usb_investigator are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆15Updated last year
- ☆12Updated 3 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated 7 months ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- NTFS file system specimens☆13Updated last year
- Plugins for the Viper Framework☆14Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Parser for Sdba memory pool tags☆18Updated 3 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- ☆14Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 4 years ago
- Tool for analysis of Windows Prefetch files☆26Updated 6 years ago
- ☆10Updated 4 years ago
- Miscellaneous Scripts☆17Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A set of tools for collecting forensic information☆26Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 3 years ago
- Work in Progress repo☆14Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- ☆18Updated 4 years ago