☆17Feb 23, 2025Updated last year
Alternatives and similar repositories for MISC
Users that are interested in MISC are comparing it to the libraries listed below
Sorting:
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Moyasar .NET client library☆15Jun 26, 2025Updated 8 months ago
- ☆13Jul 25, 2019Updated 6 years ago
- ☆18Nov 8, 2025Updated 4 months ago
- ☆21Aug 26, 2021Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- $MFT directory tree reconstruction & FILE record info☆325Oct 7, 2024Updated last year
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- An Unofficial Repo, This Repo will be have a tools to help programmers to new requirements from ZATCA In Saudi Arabia☆19Jan 30, 2026Updated last month
- ☆11Oct 12, 2024Updated last year
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 8 months ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- 010 template for apfs☆27Feb 26, 2021Updated 5 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- CTF writeups for the CTFs and Vulnerable Boxes I play with sometimes☆11Apr 20, 2017Updated 8 years ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- Jsfuck decryption implemented by pure Python code☆13Jul 22, 2019Updated 6 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- ☆40Aug 27, 2021Updated 4 years ago
- ☆65Sep 18, 2025Updated 6 months ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- macOS Artifacts☆33Mar 2, 2025Updated last year
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- Hardening audit scripts validating Workstations and Servers based on CIS benchmarks☆16Aug 19, 2025Updated 7 months ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 2 months ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Youtube talks about APIs in the context of microservices and distributed systems☆24Feb 6, 2025Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆17Nov 2, 2022Updated 3 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated 10 months ago
- A repository to host emojis used in the Digital Forensics Discord Server☆18May 28, 2022Updated 3 years ago
- libPasSQLite is delphi and object pascal bindings and wrapper around SQLite library. SQLite is library that implements a small, fast, sel…☆22Oct 30, 2021Updated 4 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆549Sep 2, 2022Updated 3 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- ☆42May 20, 2021Updated 4 years ago
- my first ever operating system☆65Dec 10, 2025Updated 3 months ago