AdamWhiteHat / Judge-Jury-and-ExecutableLinks
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆82Updated last year
Alternatives and similar repositories for Judge-Jury-and-Executable
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆26Updated 5 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆44Updated 2 months ago
- URL fingerprinting made easy☆90Updated last year
- Notes and IoCs of fresh malware☆61Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆42Updated 10 months ago
- Easy to configure Honeypot for Blue Team☆43Updated 7 months ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- PowerShell payload generator☆120Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 4 months ago
- ☆20Updated 4 years ago
- ☆53Updated 4 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 3 years ago
- ☆27Updated 3 years ago