rhqRecon Hunt Queries
Stars: ✭ 66 (-42.61%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (+24.35%)
Imago ForensicsImago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (+52.17%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-20.87%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (+0.87%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+505.22%)
LevelDBDumperDumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-80%)
MimirSmart OSINT collection of common IOC types
Stars: ✭ 63 (-45.22%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+476.52%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+989.57%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-47.83%)
Osquery ConfigurationA repository for using osquery for incident detection and response
Stars: ✭ 618 (+437.39%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+853.04%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+431.3%)
Rifiuti2Windows Recycle Bin analyser
Stars: ✭ 100 (-13.04%)
ResponseMonzo's real-time incident response and reporting tool ⚡️
Stars: ✭ 1,252 (+988.7%)
CyphonOpen source incident management and response platform.
Stars: ✭ 543 (+372.17%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (+367.83%)
Operative Frameworkoperative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
Stars: ✭ 511 (+344.35%)
SeqboxA single file container/archive that can be reconstructed even after total loss of file system structures
Stars: ✭ 480 (+317.39%)
PlasoSuper timeline all the things
Stars: ✭ 1,055 (+817.39%)
HowtheysreA curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
Stars: ✭ 6,962 (+5953.91%)
Awesome ForensicsAwesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
Stars: ✭ 446 (+287.83%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-13.04%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+801.74%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+281.74%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+255.65%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+248.7%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+233.91%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+968.7%)
MftecmdParses $MFT from NTFS file systems
Stars: ✭ 45 (-60.87%)
ZeekZeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+3534.78%)
LookylooLookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Stars: ✭ 381 (+231.3%)
Ios Triageincident response tool for iOS devices
Stars: ✭ 42 (-63.48%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+3519.13%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+215.65%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-13.91%)
TcpflowTCP/IP packet demultiplexer. Download from:
Stars: ✭ 1,231 (+970.43%)
Analyst CasefileMaltego CaseFile entities for information security investigations, malware analysis and incident response
Stars: ✭ 41 (-64.35%)
SiftSIFT
Stars: ✭ 355 (+208.7%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+759.13%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (+196.52%)
Signature BaseSignature base for my scanner tools
Stars: ✭ 1,212 (+953.91%)
Amt ForensicsRetrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
Stars: ✭ 37 (-67.83%)
Docker ExplorerA tool to help forensicate offline docker acquisitions
Stars: ✭ 328 (+185.22%)
Firefed🕵️ A tool for Firefox profile analysis, data extraction, forensics and hardening
Stars: ✭ 37 (-67.83%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+181.74%)
Oletoolsoletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Stars: ✭ 1,848 (+1506.96%)
KiewtaiA port of Kaitai to the Hiew hex editor
Stars: ✭ 108 (-6.09%)
Lw YaraYara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies
Stars: ✭ 78 (-32.17%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (+184.35%)
Forensic ToolsCIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-76.52%)
HackdroidAndroid Apps, Roms and Platforms for Pentesting
Stars: ✭ 310 (+169.57%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+3866.09%)