woanware / JumpListerLinks
☆18Updated 12 years ago
Alternatives and similar repositories for JumpLister
Users that are interested in JumpLister are comparing it to the libraries listed below
Sorting:
- Binary commandline executable to parse ETL files☆67Updated 7 years ago
- Parses the WMI object database....looking for persistence☆33Updated 5 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- Forensic Scanner☆41Updated 12 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Updated 8 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Updated 6 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 9 years ago
- Windows registry samples☆24Updated 6 years ago
- Extract compressed memory pages from page-aligned data☆46Updated 6 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- Yet another registry parser☆133Updated 3 years ago
- Parse Microsoft shim databases☆30Updated 7 months ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Google Chrome internals analysis using Volatility☆42Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Windows Prefetch parser. Supports all known versions from Windows XP to Windows 10.☆114Updated 7 months ago
- Fast incident overview☆40Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Decode security descriptors in $Secure on NTFS☆20Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Updated 6 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- Various DFIR Tools☆26Updated 7 years ago
- Registry Explorer bookmark definitions☆43Updated 8 months ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago