registry-forensics

Community

Offline Windows Registry analysis for forensics.

AuthorSherifEldeeb
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps investigators quickly identify user activity, persistence mechanisms, and malware indicators by analyzing Windows registry hives offline.

Core Features & Use Cases

  • Registry Hive Parsing: Parse SAM, SYSTEM, SOFTWARE, NTUSER.DAT, USRCLASS.DAT to extract keys and values.
  • Persistence & Activity: Detect autoruns, services, UserAssist, and Shimcache patterns to map attacker moves.
  • Timeline & Reporting: Generate activity timelines and comprehensive reports from collected hives for incident response.

Quick Start

Use the registry-forensics skill to load a directory containing registry hives (e.g., NTUSER.DAT, SAM, SYSTEM, SOFTWARE) and run the provided examples to extract artifacts and generate a report.

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: registry-forensics
Download link: https://github.com/SherifEldeeb/agentskills/archive/main.zip#registry-forensics

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.