DFIR project to collect and analyze events in Google Workspace
☆13Apr 12, 2024Updated last year
Alternatives and similar repositories for GWForensic
Users that are interested in GWForensic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jul 20, 2022Updated 3 years ago
- Bulk modify Splunk Knowledge Object's owners, permissions, apps, sharing and move them to another app☆26Aug 27, 2022Updated 3 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- ☆169Sep 30, 2025Updated 5 months ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- CEH V12 Training Kit (20 Modules)☆17Nov 15, 2024Updated last year
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- ☆24Feb 18, 2025Updated last year
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 7 months ago
- A centralized and enhanced memory analysis platform☆522Updated this week
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- A Repository to maintain short notes for my CEHv12 attempt. Give this repo a if it's useful to you☆19Sep 6, 2024Updated last year
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- ☆23Mar 2, 2026Updated 3 weeks ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- Guide journalisation Microsoft☆70Feb 23, 2026Updated last month
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- Python passive host discovery script☆11Mar 30, 2025Updated 11 months ago
- ☆16Jul 20, 2025Updated 8 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- A Windows disk dumper☆24Nov 12, 2015Updated 10 years ago
- A tool that can be used to close network connections automatically with a given parameters☆14Apr 19, 2023Updated 2 years ago
- ☆30Aug 22, 2019Updated 6 years ago