PcapfsA FUSE module to mount captured network data
Stars: ✭ 17 (-98.62%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+238.1%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-85.7%)
CTF-Script-And-Template-Thrift-Shop[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half thi…
Stars: ✭ 38 (-96.91%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (-10.97%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-71.24%)
SeqboxA single file container/archive that can be reconstructed even after total loss of file system structures
Stars: ✭ 480 (-61.01%)
bootcode parserA boot record parser that identifies known good signatures for MBR, VBR and IPL.
Stars: ✭ 91 (-92.61%)
BlockHashLocRecover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (-96.34%)
MacForensicsScripts to process macOS forensic artifacts
Stars: ✭ 118 (-90.41%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-98.94%)
toolsetUseful tools for CTF competitions
Stars: ✭ 31 (-97.48%)
Docker ExplorerA tool to help forensicate offline docker acquisitions
Stars: ✭ 328 (-73.35%)
dumproidAndroid process memory dump tool without ndk.
Stars: ✭ 55 (-95.53%)
Icpr2020dfdcVideo Face Manipulation Detection Through Ensemble of CNNs
Stars: ✭ 64 (-94.8%)
sqbriteSQBrite is a data recovery tool for SQLite databases
Stars: ✭ 27 (-97.81%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (-73.44%)
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-92.77%)
KauditAlcide Kubernetes Audit Log Analyzer - Alcide kAudit
Stars: ✭ 23 (-98.13%)
Vol3xpVolatility Explorer Suit
Stars: ✭ 31 (-97.48%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-74.74%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (-87.16%)
PlasoSuper timeline all the things
Stars: ✭ 1,055 (-14.3%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+270.51%)
WhatfilesLog what files are accessed by any Linux process
Stars: ✭ 800 (-35.01%)
ingest-fileIngestors extract the contents of mixed unstructured documents into structured (followthemoney) data.
Stars: ✭ 40 (-96.75%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (-77.25%)
MrMobile Revelator
Stars: ✭ 69 (-94.39%)
btrfscueRecover files from damaged BTRFS filesystems
Stars: ✭ 28 (-97.73%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (-79.12%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-81.8%)
hotolotidocumentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)
Stars: ✭ 66 (-94.64%)
Amt ForensicsRetrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
Stars: ✭ 37 (-96.99%)
TryHackMe-Write-UpThe entire walkthrough of all my resolved TryHackMe rooms
Stars: ✭ 53 (-95.69%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-98.21%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-95.13%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (-52.15%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (-96.34%)
dcflddEnhanced version of dd for forensics and security
Stars: ✭ 27 (-97.81%)
RemoteNETExamine, create and interact with remote objects in other .NET processes.
Stars: ✭ 29 (-97.64%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-94.88%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (-91.8%)
git-forensics-pluginJenkins plug-in that mines and analyzes data from a Git repository
Stars: ✭ 19 (-98.46%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (-45.09%)
Operative Frameworkoperative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
Stars: ✭ 511 (-58.49%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-97.48%)
sift-saltstackSalt States for Configuring the SIFT Workstation
Stars: ✭ 82 (-93.34%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (-20.71%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (-62.55%)
mini-kaliDocker image for hacking
Stars: ✭ 15 (-98.78%)
ManTraNet-pytorchImplementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch
Stars: ✭ 47 (-96.18%)
macOS-triagemacOS triage is a python script to collect various macOS logs, artifacts, and other data.
Stars: ✭ 20 (-98.38%)
AutopsyAutopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
Stars: ✭ 1,183 (-3.9%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (-94.64%)