|
You are here |
www.geekrant.org | ||
| | | | |
www.khyrenz.com
|
|
| | | | | Let me start by saying that, yes: many tools already exist to parse information out of the Windows Registry and/or the Event Log. However, while I was conducting my own tool validation processes (see https://github.com/khyrenz/tool_validation), I realised that very few tools parse this information out and automatically populate the kind of table that I would be adding into my forensic report.So... I did a bit of R&D, and I present to you a Python script that does just that; creatively named pars | |
| | | | |
www.kencochrane.com
|
|
| | | | | ||
| | | | |
spf13.com
|
|
| | | | | ||
| | | | |
schmonz.com
|
|
| | | |||