Analyzing Windows Amcache Artifacts
Extract execution evidence from Amcache.hve including application paths, SHA-1 hashes, timestamps, and publisher metadata for DFIR investigations.
Parse and analyze Windows Amcache.hve registry hive to extract program execution evidence, file metadata, SHA-1 hashes, and device connection history for digital forensics and incident response investigations.
This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.
Install skill "analyzing-windows-amcache-artifacts" with this command: npx skills add mukul975/anthropic-cybersecurity-skills/mukul975-anthropic-cybersecurity-skills-analyzing-windows-amcache-artifacts
Extract execution evidence from Amcache.hve including application paths, SHA-1 hashes, timestamps, and publisher metadata for DFIR investigations.
This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.
Related by shared tags or category signals.
No summary provided by upstream source.
No summary provided by upstream source.
No summary provided by upstream source.
No summary provided by upstream source.