sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (+246.15%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (+0%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (+1861.54%)
Docker ExplorerA tool to help forensicate offline docker acquisitions
Stars: ✭ 328 (+2423.08%)
dcflddEnhanced version of dd for forensics and security
Stars: ✭ 27 (+107.69%)
MeerkatA collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (+2084.62%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+2853.85%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (+69.23%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+3938.46%)
lsrootkitRootkit Detector for UNIX
Stars: ✭ 53 (+307.69%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+142015.38%)
bootcode parserA boot record parser that identifies known good signatures for MBR, VBR and IPL.
Stars: ✭ 91 (+600%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+32946.15%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+22638.46%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+4430.77%)
bits parserExtract BITS jobs from QMGR queue and store them as CSV records
Stars: ✭ 64 (+392.31%)
SiftSIFT
Stars: ✭ 355 (+2630.77%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (+46.15%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+5484.62%)
git-forensics-pluginJenkins plug-in that mines and analyzes data from a Git repository
Stars: ✭ 19 (+46.15%)
Mac aptmacOS Artifact Parsing Tool
Stars: ✭ 329 (+2430.77%)
sift-saltstackSalt States for Configuring the SIFT Workstation
Stars: ✭ 82 (+530.77%)
Operative Frameworkoperative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
Stars: ✭ 511 (+3830.77%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (+423.08%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+2292.31%)
ManTraNet-pytorchImplementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch
Stars: ✭ 47 (+261.54%)
Awesome ForensicsAwesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
Stars: ✭ 446 (+3330.77%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+2192.31%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+4446.15%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (+2053.85%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+2984.62%)
UsbripTracking history of USB events on GNU/Linux
Stars: ✭ 903 (+6846.15%)
wipedicksWipe files and drives securely with randoms ASCII dicks
Stars: ✭ 94 (+623.08%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+31915.38%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (+138.46%)
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (+4169.23%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (+138.46%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+2623.08%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (+384.62%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-30.77%)
ImageSplicingDetectionIlluminant inconsistencies for image splicing detection in forensics
Stars: ✭ 36 (+176.92%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+27438.46%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (+246.15%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+3846.15%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (+61.54%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (+2415.38%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+246.15%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+51261.54%)
macOS-triagemacOS triage is a python script to collect various macOS logs, artifacts, and other data.
Stars: ✭ 20 (+53.85%)
mini-kaliDocker image for hacking
Stars: ✭ 15 (+15.38%)
SeqboxA single file container/archive that can be reconstructed even after total loss of file system structures
Stars: ✭ 480 (+3592.31%)
HackdroidAndroid Apps, Roms and Platforms for Pentesting
Stars: ✭ 310 (+2284.62%)
GensumPowerful checksum generator!
Stars: ✭ 12 (-7.69%)
KauditAlcide Kubernetes Audit Log Analyzer - Alcide kAudit
Stars: ✭ 23 (+76.92%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+5253.85%)