A memory forensics workshop i delivered to the ENSIAS IT Cybersecurity members
☆14Dec 7, 2019Updated 6 years ago
Alternatives and similar repositories for memory-forensics-workshop
Users that are interested in memory-forensics-workshop are comparing it to the libraries listed below
Sorting:
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- ☆14Dec 6, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- ☆10Aug 21, 2024Updated last year
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Code implemented on Rinkeby testnet, along with a wiki guide for the Bug Bounty.☆17Feb 26, 2018Updated 8 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Aug 12, 2025Updated 6 months ago
- OpenCL Digital Forensics data analysis and file carving tool☆24May 14, 2023Updated 2 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- Tools for flashing a USR5686G modem☆20Aug 6, 2020Updated 5 years ago
- MWDB exercises☆20Jan 21, 2025Updated last year
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- Practical Web Penetration Testing, published by Packt☆25Jan 30, 2023Updated 3 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- ☆25Mar 21, 2020Updated 5 years ago