FTK Imager a Forensics Tools For MAC OS X
☆75Jul 26, 2018Updated 7 years ago
Alternatives and similar repositories for FTK-imager-OSX
Users that are interested in FTK-imager-OSX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sample data generator for the Splunk for Palo Alto Networks app.☆11Sep 25, 2016Updated 9 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script to parse Safari Binary Cookies from Cookies.binarycookies file☆39Apr 5, 2017Updated 9 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- A lightweight C++/C AFF4 reader library☆15Feb 5, 2026Updated 2 months ago
- Forensic Artifact Collection Tool for macOS☆119Jul 28, 2025Updated 9 months ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- ☆15Aug 20, 2019Updated 6 years ago
- A quick reference guide for python script development in DFIR☆18Mar 20, 2024Updated 2 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆18Updated this week
- Microsoft decompiled IrDA drivers☆16Apr 15, 2015Updated 11 years ago
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆19Nov 5, 2023Updated 2 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Digital Forensics with Kali Linux, published by Packt☆101Jan 30, 2023Updated 3 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- MP3 & MP4 Youtube Downloader☆13Mar 15, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- to show all hidden EFIs and any APFS subvolumes☆11Jul 5, 2021Updated 4 years ago
- iPhone Forensics Tool☆16Nov 29, 2024Updated last year
- Resources for HFS+ Forensics☆38Nov 15, 2015Updated 10 years ago
- Stigma instruments the Smali assembly code of commodity Android applications in order to implement dynamic information flow tracking.☆12Nov 7, 2025Updated 5 months ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Libewf is a library to access the Expert Witness Compression Format (EWF)☆306Dec 20, 2025Updated 4 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆22Nov 12, 2024Updated last year
- Discover which process execute a hunted binary inside macOS☆29Dec 15, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 9 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.☆16Sep 4, 2024Updated last year
- Google Cloud Platform (GCP) Security Command Center Alerts enablement scripts☆32Apr 8, 2021Updated 5 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 3 months ago
- Live system forensic collector☆16Jun 8, 2022Updated 3 years ago