williballenthin / process-forestLinks
Reconstruct process trees from event logs
☆147Updated 5 years ago
Alternatives and similar repositories for process-forest
Users that are interested in process-forest are comparing it to the libraries listed below
Sorting:
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆120Updated last year
- Lazy Office Analyzer☆122Updated 8 years ago
- Python script for extracting USB information from Windows registry hives☆128Updated 6 years ago
- ☆82Updated 9 years ago
- Some IR notes☆73Updated 9 years ago
- Page File analysis tools.☆128Updated 9 years ago
- Autoruns plugin for the Volatility framework☆122Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- Malware Repository Framework☆99Updated 7 years ago
- ☆36Updated 9 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- Python IOC Editor☆63Updated 10 years ago
- Sysmon configuration☆65Updated 7 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- AuditParser☆60Updated 12 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 9 years ago
- Splunk Boss of the SOC v1 data set.☆112Updated 7 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆50Updated 7 years ago
- Windows Live Artifacts Acquisition Script☆189Updated 3 years ago
- Tool to parse SRU database☆25Updated 7 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- ☆278Updated 2 years ago
- ☆108Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 8 years ago