☆46Dec 23, 2024Updated last year
Alternatives and similar repositories for Anti-Forensic-Techniques
Users that are interested in Anti-Forensic-Techniques are comparing it to the libraries listed below
Sorting:
- ☆24Feb 18, 2025Updated last year
- ☆16Jan 20, 2026Updated last month
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆13Nov 20, 2025Updated 3 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- ☆18Jun 25, 2024Updated last year
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 9 months ago
- ☆107Feb 12, 2025Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆64Oct 16, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆30Jan 27, 2026Updated last month
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- DEFCON 31 slide deck and video link☆67Jun 2, 2025Updated 9 months ago
- ☆40Dec 3, 2023Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 3 months ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- BayesML: your first library for Bayesian machine learning☆19Jan 27, 2026Updated last month
- Fast GeoIP2 Reader for Rust☆34Feb 20, 2026Updated 2 weeks ago
- ☆96Apr 13, 2024Updated last year
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Jan 13, 2026Updated last month
- A high-speed forensic timeline engine for Windows forensic artifact CSV output built for DFIR investigators. Quickly consolidate CSV outp…☆309Feb 26, 2026Updated last week
- ☆37Oct 3, 2023Updated 2 years ago
- ☆682Feb 28, 2026Updated last week
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆101Jan 26, 2026Updated last month
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179May 28, 2025Updated 9 months ago