A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
☆82Mar 25, 2024Updated 2 years ago
Alternatives and similar repositories for Judge-Jury-and-Executable
Users that are interested in Judge-Jury-and-Executable are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆18Jul 26, 2024Updated last year
- Arbitrary precision rational number class☆35Mar 3, 2026Updated 3 weeks ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Data first or code first ORM. Entity/object/class/poco to SQL repository mapping, and vice versa; data to C# class code or emit assembly.…☆37Jun 7, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆12May 27, 2023Updated 2 years ago
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 11 months ago
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated last month
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated 3 weeks ago
- An arbitrary-precision decimal (base 10) floating-point number class. Over 16 million downloads on NuGet!☆74Dec 21, 2025Updated 3 months ago
- A complete, proof-of-concept, C# implementation of the General Number Field Sieve algorithm for factoring very large semi-prime numbers. …☆62May 24, 2025Updated 10 months ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 5 months ago
- ☆100Nov 10, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Mar 18, 2026Updated last week
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices☆161May 21, 2020Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago