process-forest
Process analyzer
Tools for reconstructing historical process hierarchies from Windows event logs.
Reconstruct process trees from event logs
146 stars
16 watching
29 forks
Language: Python
last commit: about 5 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Recover event log entries from an image by identifying record structures. | 27 |
| | Analyzes Windows event log data to visualize historic process execution evidence in a tree view. | 59 |
| | A Python module for parsing classic Windows Event Log files (.evt) | 49 |
| | A Python module for parsing Windows Event Log files (.evtx) into structured data | 732 |
| | Reconstructs fragments of event log data from raw binary files, including unallocated space and memory images. | 191 |
| | This tool helps reconstruct user activities by parsing Windows Registry data. | 151 |
| | A Python library for analyzing and working with NTFS file systems. | 81 |
| | Enables JSON document transformation and enrichment with configurable pipelines and patterns | 116 |
| | A collection of R functions for analyzing and processing remote sensing forest data to detect and segment individual trees. | 68 |
| | Tool for analyzing and structuring log data from JSON-like sources | 7 |
| | Automates analysis of Windows Security Events to identify user logon relations | 241 |
| | A tool to analyze Windows event logs for signs of APT attacks and malware activity. | 1,265 |
| | Tool to repair Windows Event Log files (.evt) acquired during forensic investigations | 18 |
| | A utility that analyzes and displays detailed information about processes and their relationships with other processes. | 24 |
| | An in-depth analysis of random forests, focusing on their learning capabilities and interpretability. | 525 |