woanware / JumpListerLinks
☆18Updated 12 years ago
Alternatives and similar repositories for JumpLister
Users that are interested in JumpLister are comparing it to the libraries listed below
Sorting:
- Windows link file (shortcuts) examiner☆68Updated last year
- Various DFIR Tools☆26Updated 7 years ago
- Parses the WMI object database....looking for persistence☆34Updated 6 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Updated last year
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Binary commandline executable to parse ETL files☆68Updated 7 years ago
- Decode security descriptors in $Secure on NTFS☆21Updated 3 years ago
- Forensic Scanner☆41Updated 13 years ago
- Windows registry samples☆24Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- NTFS parser, plus linking capabilites between MFT LogFile and UsnJrnl☆39Updated 9 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 9 years ago
- LNK to JSON☆14Updated 6 years ago
- ☆52Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Updated 2 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Updated 8 years ago
- Tool for analysis of Windows Prefetch files☆26Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 8 years ago
- Set of utilities for getting information about Windows Events☆15Updated 7 years ago
- Registry Explorer bookmark definitions☆44Updated last year
- Extract common Windows artifacts from source images and VSCs☆63Updated 4 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Updated 10 years ago