REMnux / distroLinks
This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs from the REMnux package repository on Launchpad.
☆96Updated 3 months ago
Alternatives and similar repositories for distro
Users that are interested in distro are comparing it to the libraries listed below
Sorting:
- This repository maintains the SaltStack state files for the REMnux distro.☆54Updated last month
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆48Updated last year
- Valhalla API Client☆70Updated 2 years ago
- A modern Python-3-based alternative to RegRipper☆198Updated 7 months ago
- An AFF4 C++ implementation.☆211Updated 2 years ago
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆140Updated 5 years ago
- Set of Yara rules for finding files using magics headers☆141Updated 5 years ago
- A better strings utility!☆142Updated 2 months ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆199Updated 7 months ago
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆289Updated 3 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated 2 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- DFF (Digital Forensics Framework) is a Forensics Framework coming with command line and graphical interfaces. DFF can be used to investig…☆295Updated 5 years ago
- Command line access to the Registry☆158Updated 2 weeks ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- User guide of MISP☆280Updated 10 months ago
- Software downloads☆109Updated 5 months ago
- ☆141Updated 2 months ago
- ☆27Updated 3 months ago
- Automated handling of data feeds for security teams☆143Updated last month
- The kernel patch and userspace tools to enable Linux software write blocking☆148Updated 5 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆65Updated 4 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 7 months ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)