CyberSecurityUP / Anti-Forensic-TechniquesView external linksLinks
☆45Dec 23, 2024Updated last year
Alternatives and similar repositories for Anti-Forensic-Techniques
Users that are interested in Anti-Forensic-Techniques are comparing it to the libraries listed below
Sorting:
- ☆24Feb 18, 2025Updated 11 months ago
- ☆14Jan 20, 2026Updated 3 weeks ago
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 8 months ago
- ☆18Jun 25, 2024Updated last year
- ☆106Feb 12, 2025Updated last year
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆20Jul 9, 2024Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Ghosting-AMSI☆18Apr 30, 2025Updated 9 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆30Jan 27, 2026Updated 2 weeks ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- A Programmer☆13Dec 20, 2025Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 2 months ago
- BayesML: your first library for Bayesian machine learning☆16Jan 27, 2026Updated 2 weeks ago
- Fast GeoIP2 Reader for Rust☆34Mar 28, 2024Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Apr 26, 2025Updated 9 months ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- ☆650Feb 6, 2026Updated last week
- A high-speed forensic timeline engine for Windows forensic artifact CSV output built for DFIR investigators. Quickly consolidate CSV outp…☆302Nov 6, 2025Updated 3 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Jan 13, 2026Updated last month
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆99Jan 26, 2026Updated 2 weeks ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179May 28, 2025Updated 8 months ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- HackRF Sweep Spectrum Analyzer☆13Apr 21, 2025Updated 9 months ago
- ☆13Mar 28, 2024Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A Simple Kiosk application built using Flutter☆13Feb 28, 2022Updated 3 years ago
- Grub Theme☆12Aug 29, 2022Updated 3 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- A sexy binary protocol written in c with zero-allocations☆11Dec 13, 2025Updated 2 months ago