Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✠183 (+632%)
Gda Android Reversing ToolGDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✠2,332 (+9228%)
pyaff4The Python implementation of the AFF4 standard.
Stars: ✠37 (+48%)
ForensicsToolsA list of free and open forensics analysis tools and other resources
Stars: ✠392 (+1468%)
Imm2VirtualThis is a GUI (for Windows 64 bit) for a procedure to virtualize your EWF(E01), DD (raw), AFF disk image file without converting it, directly with VirtualBox, forensically proof.
Stars: ✠40 (+60%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✠15,412 (+61548%)
DrakvufDRAKVUF Black-box Binary Analysis
Stars: ✠628 (+2412%)
dcflddEnhanced version of dd for forensics and security
Stars: ✠27 (+8%)
SeeSandboxed Execution Environment
Stars: ✠770 (+2980%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✠108 (+332%)
SimpleatorSimpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✠260 (+940%)
rair-coreRAIR: RAdare In Rust
Stars: ✠63 (+152%)
lsrootkitRootkit Detector for UNIX
Stars: ✠53 (+112%)
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✠66 (+164%)
Oletoolsoletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Stars: ✠1,848 (+7292%)
aparoidStatic and dynamic Android application security analysis
Stars: ✠62 (+148%)
btrfscueRecover files from damaged BTRFS filesystems
Stars: ✠28 (+12%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✠45 (+80%)
dnslogMinimalistic DNS logging tool
Stars: ✠40 (+60%)
Yeet-Emulator🔥 A really basic emulator to understand how IL code works.
Stars: ✠47 (+88%)
hayabusaHayabusa (éš¼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✠908 (+3532%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✠297 (+1088%)
python-negotiatorScriptable KVM/QEMU guest agent implemented in Python
Stars: ✠40 (+60%)
vframeVFRAME: Visual Forensics and Metadata Extraction
Stars: ✠41 (+64%)
NETNOOBA simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✠105 (+320%)
MixewayScannerMixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and DAST types
Stars: ✠15 (-40%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✠122 (+388%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✠32 (+28%)
RemoteNETExamine, create and interact with remote objects in other .NET processes.
Stars: ✠29 (+16%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✠16 (-36%)
assemblyline-coreCore server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)
Stars: ✠16 (-36%)
node-qemu-serverFree GUI / Frontend / Management tool for simple setup, configure and control virtual machines (qemu / kvm) within your HTML5 Webbrowser. Virtualization with Node.js / Currently under complete rewrite.
Stars: ✠41 (+64%)
UnAutoItThe Cross Platform AutoIt Extractor
Stars: ✠90 (+260%)
vps host serverVPS Hosting Server Daemon for provisioning, monitoring, and communications with the central system.
Stars: ✠12 (-52%)
MantOSLIFARS Networking Security GNU/Linux distro
Stars: ✠24 (-4%)
harvestTool to sort large collections of files according to common typologies
Stars: ✠32 (+28%)
docker-boxWeb Interface to manage full blown docker containers and images.
Stars: ✠108 (+332%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✠478 (+1812%)
blogr-pvePuppet provisioning of HA failover/cluster environment implemented in Proxmox Virtual Environment and Linux boxes.
Stars: ✠28 (+12%)
fame modulesCommunity modules for FAME
Stars: ✠55 (+120%)
yaraMalice Yara Plugin
Stars: ✠27 (+8%)
TryHackMe-Write-UpThe entire walkthrough of all my resolved TryHackMe rooms
Stars: ✠53 (+112%)
telfhashSymbol hash for ELF files
Stars: ✠75 (+200%)
control-paneClonOS WEB control panel (CBSD WEB UI)
Stars: ✠112 (+348%)
xLoggerSimple windows API logger
Stars: ✠62 (+148%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✠176 (+604%)
Jira-LensFast and customizable vulnerability scanner For JIRA written in Python
Stars: ✠185 (+640%)
haaukinsA Highly Accessible and Automated Virtualization Platform for Security Education
Stars: ✠148 (+492%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✠13 (-48%)
vulnscanA static binary vulnerability scanner
Stars: ✠47 (+88%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✠101 (+304%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✠109 (+336%)
AppmemDumperForensics triage tool relying on Volatility and Foremost
Stars: ✠22 (-12%)
emeraldImport DynamoRIO drcov code coverage data into Ghidra
Stars: ✠30 (+20%)