btrfscueRecover files from damaged BTRFS filesystems
Stars: ✭ 28 (+3.7%)
SeqboxA single file container/archive that can be reconstructed even after total loss of file system structures
Stars: ✭ 480 (+1677.78%)
BlockHashLocRecover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (+66.67%)
FatcatFAT filesystems explore, extract, repair, and forensic tool
Stars: ✭ 201 (+644.44%)
AlgorithmsAlgorithms competition, Leetcode solutions, deep learning algorithms, parallel computing, and SQL solutions.
Stars: ✭ 42 (+55.56%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-51.85%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+3262.96%)
harvestTool to sort large collections of files according to common typologies
Stars: ✭ 32 (+18.52%)
db-wilayah-indonesiaData wilayah Indonesia meliputi Provinsi, Kabupaten / Kota, Kecamatan, Kelurahan disertai dengan kodepos dan standar singkatan provinsi dan kabupaten / kota.
Stars: ✭ 53 (+96.3%)
chainDBA noSQL database based on blockchain technology
Stars: ✭ 13 (-51.85%)
kunlun-storageKunlun-storage is the storage component for KunlunBase. It's developed based on percona-mysql-8.0.x and contains exclusive features used by KunlunBase, performance enhancements and XA transaction crash safety enhancements without which MySQL would not be able to execute XA transactions reliably under error conditions such as power outage, proces…
Stars: ✭ 2 (-92.59%)
MantOSLIFARS Networking Security GNU/Linux distro
Stars: ✭ 24 (-11.11%)
ingest-fileIngestors extract the contents of mixed unstructured documents into structured (followthemoney) data.
Stars: ✭ 40 (+48.15%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (+66.67%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+55.56%)
deloominatorShed the light on your data!
Stars: ✭ 47 (+74.07%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (-7.41%)
AppmemDumperForensics triage tool relying on Volatility and Foremost
Stars: ✭ 22 (-18.52%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (+40.74%)
yara-forensicsSet of Yara rules for finding files using magics headers
Stars: ✭ 115 (+325.93%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+14.81%)
mongomeiliKeep your Mongoose Schemas synced with MeiliSearch
Stars: ✭ 33 (+22.22%)
OutlookPasswordRecoveryThis tool usable for recover Outlook passwords and it working with all versions. I tested with 2007, 2010, 2013 and 2016.
Stars: ✭ 14 (-48.15%)
recoveryCreate recovery/backup codes for 2FA
Stars: ✭ 72 (+166.67%)
warrickRecover lost websites from the Web Infrastructure
Stars: ✭ 76 (+181.48%)
STingUltrafast sequence typing and gene detection from NGS raw reads
Stars: ✭ 15 (-44.44%)
CC33ZCurso de Ciência da Computação
Stars: ✭ 50 (+85.19%)
TryHackMe-Write-UpThe entire walkthrough of all my resolved TryHackMe rooms
Stars: ✭ 53 (+96.3%)
terraform-provider-rediscloudTerraform Redis Enterprise Cloud Pro Provider: Deploy, update, and manage Redis Enterprise Cloud Pro databases as code through HashiCorp Terraform
Stars: ✭ 24 (-11.11%)
dreamy-db🔥 Dreamy-db - A Powerful database for storing, accessing, and managing multiple database.
Stars: ✭ 25 (-7.41%)
RemoteNETExamine, create and interact with remote objects in other .NET processes.
Stars: ✭ 29 (+7.41%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+862.96%)
SchemaMapperA .NET class library that allows you to import data from different sources into a unified destination
Stars: ✭ 41 (+51.85%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (+274.07%)
flare-wmiNo description or website provided.
Stars: ✭ 399 (+1377.78%)
django-concurrency-talk🎭 Database Integrity in Django: Safely Handling Critical Data in Distributed Systems
Stars: ✭ 49 (+81.48%)
UnifiedLogReaderA parser for Unified logging tracev3 files
Stars: ✭ 56 (+107.41%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (+51.85%)
datajoint-pythonRelational data pipelines for the science lab
Stars: ✭ 140 (+418.52%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+551.85%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (+351.85%)
dnslogMinimalistic DNS logging tool
Stars: ✭ 40 (+48.15%)
QR-secret-sharing🔒 Create QR codes to secret-share a message. Ideal for cryptocurrency wallet recovery keys and passwords.
Stars: ✭ 94 (+248.15%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (+485.19%)
qedThe scalable, auditable and high-performance tamper-evident log project
Stars: ✭ 87 (+222.22%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+729.63%)
blockyarchiveBlocky archive - multithreaded archiver offering bit rot protection and sector level recoverability
Stars: ✭ 88 (+225.93%)
Imm2VirtualThis is a GUI (for Windows 64 bit) for a procedure to virtualize your EWF(E01), DD (raw), AFF disk image file without converting it, directly with VirtualBox, forensically proof.
Stars: ✭ 40 (+48.15%)
emergency-kexecKexec into an in-memory emergency system
Stars: ✭ 21 (-22.22%)
RestaurantReactAppThis is a responsive website that uses PWA app standards, completely created with React, React router and firebase
Stars: ✭ 59 (+118.52%)
Vol3xpVolatility Explorer Suit
Stars: ✭ 31 (+14.81%)
memscrimperCode for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
Stars: ✭ 25 (-7.41%)