CyberSecurityUP / Anti-Forensic-TechniquesView external linksLinks
☆45Dec 23, 2024Updated last year
Alternatives and similar repositories for Anti-Forensic-Techniques
Users that are interested in Anti-Forensic-Techniques are comparing it to the libraries listed below
Sorting:
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- ☆24Feb 18, 2025Updated 11 months ago
- ☆14Jan 20, 2026Updated 3 weeks ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- ☆18Jun 25, 2024Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 8 months ago
- ☆106Feb 12, 2025Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Oct 16, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆20Jul 9, 2024Updated last year
- Ghosting-AMSI☆18Apr 30, 2025Updated 9 months ago
- Hardened your Windows OS against forensics analysis☆22Nov 27, 2024Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Windows kernel driver encryption library, support base64, aes-256, rsa-2048 and higher, ecc-256, single file, minimal dependence, support…☆22May 20, 2021Updated 4 years ago
- A Programmer☆13Dec 20, 2025Updated last month
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- DEFCON 31 slide deck and video link☆66Jun 2, 2025Updated 8 months ago
- BayesML: your first library for Bayesian machine learning☆16Jan 27, 2026Updated 2 weeks ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 2 months ago
- Fast GeoIP2 Reader for Rust☆34Mar 28, 2024Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Apr 26, 2025Updated 9 months ago
- ☆96Apr 13, 2024Updated last year
- Windows based version of the popular app Ls Droid used for flashing the 99-07 General Motors V8 Engine Computers☆11Jan 31, 2021Updated 5 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- ☆650Feb 6, 2026Updated last week
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Jan 13, 2026Updated last month
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆99Jan 26, 2026Updated 2 weeks ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆52Aug 28, 2025Updated 5 months ago
- A sexy binary protocol written in c with zero-allocations☆11Dec 13, 2025Updated 2 months ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Blockchain Reader Library☆10Jan 20, 2024Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- Android based program to read and eventually write the 99-07 GM P01 and P59 computers used on the 24x LS engine.☆11Oct 28, 2018Updated 7 years ago