A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆82Mar 25, 2024Updated 2 years ago
Alternatives and similar repositories for Judge-Jury-and-Executable
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆18Jul 26, 2024Updated last year
- Arbitrary precision rational number class☆35Mar 3, 2026Updated 3 weeks ago
- A procedurally generated, cave-like dungeon/map creator for rogue-like games using the cellular automata method. During its development, …☆29Jun 7, 2020Updated 5 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Creates a counting system of radixes such as base 12 or mixed radixes such as Minutes/Hours/Days/Years (60/60/24/365)☆13May 8, 2019Updated 6 years ago
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 11 months ago
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated last month
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated last month
- An arbitrary-precision decimal (base 10) floating-point number class. Over 16 million downloads on NuGet!☆74Dec 21, 2025Updated 3 months ago
- A complete, proof-of-concept, C# implementation of the General Number Field Sieve algorithm for factoring very large semi-prime numbers. …☆62May 24, 2025Updated 10 months ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 6 months ago
- ☆100Nov 10, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Mar 18, 2026Updated last week
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Sep 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 3 months ago
- This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices☆161May 21, 2020Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago