no longer maintained
☆18Feb 22, 2018Updated 8 years ago
Alternatives and similar repositories for Autopsy-WindowsRegistryContentViewer
Users that are interested in Autopsy-WindowsRegistryContentViewer are comparing it to the libraries listed below
Sorting:
- DataContentViewer module for Autopsy 3.1 to preview dozens of file types☆30Oct 28, 2020Updated 5 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- ☆23Apr 12, 2025Updated 10 months ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Powershell Keepass Brute Force Tool☆28Jul 22, 2019Updated 6 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- A powerful CLI tool for initializing specification-driven development projects with flexible, production-ready structures.☆15Updated this week
- A PowerShell module for incident response and threat hunting.☆38May 23, 2024Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Jul 28, 2020Updated 5 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆151Mar 20, 2024Updated last year
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- FontAwesome4 for Magento2☆11Oct 1, 2025Updated 5 months ago
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11May 27, 2023Updated 2 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- ☆11Aug 25, 2014Updated 11 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆11Jul 10, 2024Updated last year
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Feb 23, 2026Updated last week
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- Digital Forensics with Kali Linux, published by Packt☆101Jan 30, 2023Updated 3 years ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆48Oct 24, 2021Updated 4 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago
- A Usenet binary grabber.☆12Nov 6, 2015Updated 10 years ago
- CLIP OS Manifest☆11Nov 4, 2020Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago