woanware / JumpListerLinks
☆18Updated 12 years ago
Alternatives and similar repositories for JumpLister
Users that are interested in JumpLister are comparing it to the libraries listed below
Sorting:
- Binary commandline executable to parse ETL files☆69Updated 7 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- Tool for analysis of Windows Prefetch files☆26Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 9 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Windows registry samples☆24Updated 7 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- Various DFIR Tools☆27Updated 7 years ago
- Decode security descriptors in $Secure on NTFS☆22Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- Fast incident overview☆41Updated 9 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 8 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆110Updated 5 years ago
- ☆52Updated 7 years ago
- Forensic Scanner☆41Updated 13 years ago
- Extract common Windows artifacts from source images and VSCs☆64Updated 4 years ago
- Windows Prefetch parser. Supports all known versions from Windows XP to Windows 10.☆116Updated last year
- Powerful commandline $MFT record editor.☆25Updated 10 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- NTFS parser, plus linking capabilites between MFT LogFile and UsnJrnl☆38Updated 9 years ago
- It's not just UsnJrnl (USN Journal Records/Change Journal Records) parser.☆23Updated 7 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago