MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+3063.64%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+1313.64%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+700%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+90.91%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (+86.36%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (+0%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+1509.09%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+1995.45%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (+618.18%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (+45.45%)
PackratLive system forensic collector
Stars: ✭ 16 (-27.27%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+772.73%)
LevelDBDumperDumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (+4.55%)
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+668.18%)
Mac aptmacOS Artifact Parsing Tool
Stars: ✭ 329 (+1395.45%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+5595.45%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+4881.82%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+918.18%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (+186.36%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+8059.09%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (+200%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+759.09%)
UserlineQuery and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (+904.55%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+1081.82%)
dnslogMinimalistic DNS logging tool
Stars: ✭ 40 (+81.82%)
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (+145.45%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+2577.27%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+40.91%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (+359.09%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (+104.55%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (+454.55%)
smram parseSystem Management RAM analysis tool
Stars: ✭ 50 (+127.27%)
ir scriptsincident response scripts
Stars: ✭ 17 (-22.73%)
WELAWELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (+1909.09%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (+1172.73%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+3986.36%)
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (+2422.73%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+1045.45%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+4027.27%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (+72.73%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (+13.64%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (+13.64%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+104.55%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+59.09%)
btrfscueRecover files from damaged BTRFS filesystems
Stars: ✭ 28 (+27.27%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+1827.27%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+1204.55%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-27.27%)
yara-forensicsSet of Yara rules for finding files using magics headers
Stars: ✭ 115 (+422.73%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+359.09%)
UnifiedLogReaderA parser for Unified logging tracev3 files
Stars: ✭ 56 (+154.55%)
memscrimperCode for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
Stars: ✭ 25 (+13.64%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+595.45%)
know your ipKnow Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-27.27%)