woanware / JumpListerLinks
☆18Updated 12 years ago
Alternatives and similar repositories for JumpLister
Users that are interested in JumpLister are comparing it to the libraries listed below
Sorting:
- Windows registry samples☆23Updated 6 years ago
- Decode security descriptors in $Secure on NTFS☆20Updated 3 years ago
- Parses the WMI object database....looking for persistence☆32Updated 5 years ago
- Various DFIR Tools☆26Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆27Updated 9 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 9 years ago
- Binary commandline executable to parse ETL files☆67Updated 7 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- Binaries for the log2timeline projects and dependencies☆39Updated 9 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- An updated C# port of X-Ways X-Tensions API.☆12Updated 7 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆16Updated last year
- Forensic Scanner☆41Updated 12 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- LNK to JSON☆14Updated 6 years ago
- Registry Explorer bookmark definitions☆43Updated 6 months ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Extract compressed memory pages from page-aligned data☆45Updated 6 years ago
- Parse Microsoft shim databases☆30Updated 5 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Windows Thingies in Python for live use.☆24Updated 6 years ago