MMarianus / EurekaLinks
Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).
☆19Updated last year
Alternatives and similar repositories for Eureka
Users that are interested in Eureka are comparing it to the libraries listed below
Sorting:
- Parses Java Cache IDX files☆40Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Simple DDE object detector☆56Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Updated 9 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Passive recon / OSINT automation script☆38Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- An offensive Powershell console☆30Updated 10 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 8 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 11 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- Python bindings for Yeti's API☆19Updated 2 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Set of utilities for getting information about Windows Events☆15Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago