HuskyHacks / blue-jupyterView external linksLinks
Jupyter Notebooks for the Blue Team
☆39Jan 16, 2025Updated last year
Alternatives and similar repositories for blue-jupyter
Users that are interested in blue-jupyter are comparing it to the libraries listed below
Sorting:
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Packet Analysis on Steroids☆12Oct 20, 2022Updated 3 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆14Jul 19, 2025Updated 6 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- ☆13May 22, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- single-threaded event driven sleep obfuscation poc for linux☆37Jun 14, 2025Updated 8 months ago
- ☆33Dec 4, 2022Updated 3 years ago
- Detection Engineering Tools☆20Feb 9, 2026Updated last week
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆42Updated this week
- Jupyter Notebooks for the Blue Team☆145Mar 21, 2025Updated 10 months ago
- ☆18Jul 24, 2019Updated 6 years ago
- Autopsy NBM Plugins☆18Jul 9, 2023Updated 2 years ago
- Windows API (WinAPI) functions and system calls with categories in JSON format, including arguments (SAL notation) and more.☆25Jun 11, 2025Updated 8 months ago
- ☆22Aug 29, 2024Updated last year
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- ☆62Oct 12, 2024Updated last year
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 3 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Practical Windows Forensics Training☆740Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- A C# utility for interacting with SCOM☆95Dec 2, 2025Updated 2 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- SSL certificate parsing for humans☆36Jun 30, 2024Updated last year
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.☆320Apr 14, 2023Updated 2 years ago