AdamWhiteHat / Judge-Jury-and-ExecutableLinks
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆81Updated last year
Alternatives and similar repositories for Judge-Jury-and-Executable
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆26Updated 5 years ago
- Data exfiltration and covert communication tool☆39Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- Notes and IoCs of fresh malware☆58Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- ☆53Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- All the useful tools interesting to be used☆23Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆42Updated last month
- Carbon Black Response IR tool☆55Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- Open source tool for static analysis of malwares.☆28Updated 5 years ago
- ☆69Updated 4 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Updated 4 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 7 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆40Updated 7 months ago