CrowdStrike / travel-laptopView external linksLinks
Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"
☆242Oct 13, 2025Updated 4 months ago
Alternatives and similar repositories for travel-laptop
Users that are interested in travel-laptop are comparing it to the libraries listed below
Sorting:
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Jun 19, 2017Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Nov 26, 2015Updated 10 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Bro scripts written by CrowdStrike Services☆148May 3, 2021Updated 4 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- C++ application that uses memory and code hooks to detect packers☆274Mar 5, 2018Updated 7 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Sep 24, 2014Updated 11 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Scripts and code referenced in CrowdStrike blog posts☆336Nov 13, 2019Updated 6 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆211Oct 12, 2023Updated 2 years ago