RigspolitietNC3 / nc3ctf2018Links
NC3 Jule CTF 2018
☆12Updated 5 years ago
Alternatives and similar repositories for nc3ctf2018
Users that are interested in nc3ctf2018 are comparing it to the libraries listed below
Sorting:
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,026Updated 3 weeks ago
- Presentations and handouts☆36Updated last month
- Android Logs Events And Protobuf Parser☆669Updated this week
- ☆14Updated 2 years ago
- Repo to store compiled modules or links to 3rd party add-on modules.☆511Updated 9 months ago
- Autopsy Python Plugins☆356Updated 2 months ago
- iOS Logs, Events, And Plist Parser☆919Updated last week
- A curated list of awesome infosec courses and training resources.☆203Updated last year
- This repository serves as a place for community created Targets and Modules for use with KAPE.☆755Updated this week
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆706Updated 2 months ago
- Extract and Visualize Data from URLs using Unfurl☆683Updated this week
- Queries to use on the store.cloudphotodb database. Provides you with iCloud Photos Sync directions and other information☆12Updated last year
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportu…☆214Updated 6 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆100Updated 10 months ago
- CyLR - Live Response Collection Tool☆684Updated 3 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆603Updated 5 months ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆233Updated 7 months ago
- IoT Digital Forensics Course with hands-on labs☆229Updated last year
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago
- Super timeline all the things☆1,896Updated 2 weeks ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,417Updated 10 months ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,744Updated 4 years ago
- Web browser forensics for Google Chrome/Chromium☆1,214Updated 2 weeks ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,492Updated 2 months ago
- RegRipper3.0☆628Updated 8 months ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆608Updated 11 months ago
- ☆447Updated 8 months ago
- Apple Pattern of Life Lazy Output'er☆603Updated last year
- Exchange Transport rules to detect and enable response to phishing☆415Updated 5 years ago
- Create lab environment for Linux Command Line course☆48Updated 10 months ago