AdamWhiteHat / Judge-Jury-and-ExecutableLinks
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆82Updated last year
Alternatives and similar repositories for Judge-Jury-and-Executable
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below
Sorting:
- URL fingerprinting made easy☆89Updated last year
- ☆53Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated last month
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 weeks ago
- Hashes of infamous malware☆26Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 2 years ago
- Carbon Black Response IR tool☆55Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆35Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆25Updated 3 years ago