python-tinyscriptDevkit for quickly building CLI tools with Python
Stars: ✭ 39 (+77.27%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+1081.82%)
Vol3xpVolatility Explorer Suit
Stars: ✭ 31 (+40.91%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+731.82%)
WhatsdumpExtract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
Stars: ✭ 198 (+800%)
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+200%)
flare-wmiNo description or website provided.
Stars: ✭ 399 (+1713.64%)
PackratLive system forensic collector
Stars: ✭ 16 (-27.27%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+8059.09%)
Oletoolsoletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Stars: ✭ 1,848 (+8300%)
Forensic ToolsA collection of tools for forensic analysis
Stars: ✭ 204 (+827.27%)
Ctf ToolsUseful CTF Tools
Stars: ✭ 190 (+763.64%)
JoincapMerge multiple pcap files together, gracefully.
Stars: ✭ 159 (+622.73%)
xecaPowerShell payload generator
Stars: ✭ 103 (+368.18%)
C Aff4An AFF4 C++ implementation.
Stars: ✭ 126 (+472.73%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+700%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (+104.55%)
Rifiuti2Windows Recycle Bin analyser
Stars: ✭ 100 (+354.55%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+36472.73%)
GohacktoolsHacker tools on Go (Golang)
Stars: ✭ 1,303 (+5822.73%)
LogESPOpen Source SIEM (Security Information and Event Management system).
Stars: ✭ 162 (+636.36%)
FatcatFAT filesystems explore, extract, repair, and forensic tool
Stars: ✭ 201 (+813.64%)
BlockHashLocRecover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (+104.55%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+772.73%)
EruditusDiscord CTF helper bot for CyberErudites
Stars: ✭ 34 (+54.55%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+759.09%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+40.91%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (+677.27%)
SiemSIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (+613.64%)
qedThe scalable, auditable and high-performance tamper-evident log project
Stars: ✭ 87 (+295.45%)
SleuthkitThe Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
Stars: ✭ 1,948 (+8754.55%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+681.82%)
MbaMalware Behavior Analyzer
Stars: ✭ 125 (+468.18%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (+86.36%)
Hibr2binComae Hibernation File Decompressor
Stars: ✭ 116 (+427.27%)
shellcat⚡️ ShellCat is a Reverse Shell Manager
Stars: ✭ 32 (+45.45%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+8090.91%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (+390.91%)
demuxusbA program and toolset to analyze iDevice USB sessions
Stars: ✭ 25 (+13.64%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (+350%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+5663.64%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+1045.45%)
TcpflowTCP/IP packet demultiplexer. Download from:
Stars: ✭ 1,231 (+5495.45%)
Invtero.netinVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Stars: ✭ 237 (+977.27%)
AutopsyAutopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
Stars: ✭ 1,183 (+5277.27%)
MrMobile Revelator
Stars: ✭ 69 (+213.64%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+69954.55%)
TriFlowTriFlow: Triaging Android Applications using Speculative Information Flows
Stars: ✭ 12 (-45.45%)