williballenthin / INDXParseLinks
Tool suite for inspecting NTFS artifacts.
☆223Updated last year
Alternatives and similar repositories for INDXParse
Users that are interested in INDXParse are comparing it to the libraries listed below
Sorting:
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆195Updated 4 months ago
- Windows Prefetch parser. Supports all known versions from Windows XP to Windows 10.☆114Updated 6 months ago
- A modern Python-3-based alternative to RegRipper☆196Updated 4 months ago
- A better strings utility!☆136Updated last month
- ☆278Updated 2 years ago
- Regipy is an os independent python library for parsing offline registry hives☆258Updated last month
- "Evolving AppCompat/AmCache data analysis beyond grep"☆205Updated 3 years ago
- Yet another registry parser☆133Updated 3 years ago
- Parser for $LogFile on NTFS☆199Updated 2 months ago
- An AFF4 C++ implementation.☆206Updated 2 years ago
- Tools from WFA 4/e, timeline tools, etc.☆141Updated last year
- Command line access to the Registry☆153Updated 2 weeks ago
- An NTFS/FAT parser for digital forensics & incident response☆206Updated 8 months ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆119Updated last year
- ☆304Updated 4 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated last week
- analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multip…☆487Updated last week
- Python script for extracting USB information from Windows registry hives☆128Updated 5 years ago
- Extract $MFT record info and log it to a csv file.☆274Updated 9 months ago
- Comae Hibernation File Decompressor☆153Updated 2 years ago
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆124Updated 2 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆327Updated 5 months ago
- Tool to extract the $UsnJrnl from an NTFS volume☆108Updated 6 years ago
- Parser for $UsnJrnl on NTFS☆113Updated 2 years ago
- Windows Live Artifacts Acquisition Script☆188Updated 3 years ago
- An NTFS journal parser☆82Updated 9 years ago
- Example programs used in the automating DFIR series☆63Updated 6 years ago
- ☆427Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆125Updated 3 years ago