MMarianus / Eureka
Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).
☆19Updated last year
Alternatives and similar repositories for Eureka
Users that are interested in Eureka are comparing it to the libraries listed below
Sorting:
- Parses Java Cache IDX files☆39Updated 7 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- ☆26Updated 5 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 6 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- ☆16Updated 10 years ago
- Some rules, scripts of some use to us☆9Updated 6 months ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆19Updated 9 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- How can you track the hunting techniques you come up with?☆13Updated 7 years ago
- ☆14Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- ☆16Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago