DNPA / OcfaLibLinks
The core libraries of the Open Computer Forensics Architecture (OCFA)
☆13Updated 13 years ago
Alternatives and similar repositories for OcfaLib
Users that are interested in OcfaLib are comparing it to the libraries listed below
Sorting:
- ☆10Updated 7 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 12 years ago
- ☆36Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A curated list of tools for incident response☆29Updated last year
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- ☆24Updated 5 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 5 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 3 years ago
- Network Security Monitoring Framework☆47Updated 12 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆98Updated 8 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- YAPDNS☆39Updated 10 years ago
- A content inspecting SMTP proxy☆17Updated 11 years ago
- shell script to create an image and perform initial examination on a drive☆15Updated 5 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- python based backdoor software☆17Updated 13 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated last year
- Python libary to normalize Yara signatures☆19Updated 4 years ago