AdamWhiteHat / Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆80Updated last year
Alternatives and similar repositories for Judge-Jury-and-Executable:
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- ☆65Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆172Updated 6 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆106Updated 8 months ago
- ☆51Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆115Updated 5 months ago
- ☆37Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- ☆26Updated 3 years ago
- ☆63Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆90Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆33Updated 3 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- URL fingerprinting made easy☆86Updated 11 months ago