Jsitech / Forensics-CheatSheetsLinks
Terminal Forensics CheatSheets
☆13Updated 10 years ago
Alternatives and similar repositories for Forensics-CheatSheets
Users that are interested in Forensics-CheatSheets are comparing it to the libraries listed below
Sorting:
- Passive Network Audit Framework☆32Updated 7 years ago
- Automated Memory Forensic☆34Updated 7 years ago
- mindmap created for tools can be used during analysis/investigation☆28Updated 9 years ago
- Snort_rules detection bad actors.☆29Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆40Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Wireless Forensics Framework In Python☆19Updated 9 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Updated 6 years ago
- Incident Response Scripts☆30Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Updated 10 years ago
- ☆52Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- ☆30Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago