Jsitech / Forensics-CheatSheetsLinks
Terminal Forensics CheatSheets
☆13Updated 10 years ago
Alternatives and similar repositories for Forensics-CheatSheets
Users that are interested in Forensics-CheatSheets are comparing it to the libraries listed below
Sorting:
- Wireless Forensics Framework In Python☆19Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- Snort_rules detection bad actors.☆29Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- Automated Memory Forensic☆34Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 9 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- ☆30Updated 7 years ago
- The goal of this program is to quickly pull and install repos from its list☆41Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Batch scripts to capture volatile and log information from a target system☆21Updated 11 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- This tool helps you pentest THE PAST of a website.☆15Updated 5 months ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago