Loading...
Loading...
Found 2 Skills
Analyze Windows Registry hives for forensic investigation. Use when investigating malware persistence, user activity, system configuration changes, or evidence of program execution. Supports offline registry analysis from disk images or extracted hives.
Comprehensive single-protocol analysis combining TVL, fees, revenue, yields, events, income, and user activity. Produces a full protocol report. Use when the user asks for a complete overview, deep dive, "tell me everything about" a protocol, or a protocol research report.