AdamWhiteHat / Judge-Jury-and-ExecutableLinks
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆82Updated last year
Alternatives and similar repositories for Judge-Jury-and-Executable
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆53Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- URL fingerprinting made easy☆87Updated last year
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 4 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Carbon Black Response IR tool☆54Updated 4 years ago
- My Python Cookiecutter project template☆31Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Notes and IoCs of fresh malware☆58Updated last year
- Hashes of infamous malware☆26Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Updated last month
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago