These are some of the commands which I use frequently during Malware Analysis and DFIR.
☆24Jan 8, 2024Updated 2 years ago
Alternatives and similar repositories for cheatsheet
Users that are interested in cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 12 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆22Dec 3, 2018Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆30Jul 26, 2024Updated last year
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- ☆11Nov 13, 2024Updated last year
- A repository to host emojis used in the Digital Forensics Discord Server☆18May 28, 2022Updated 3 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Exploit for win10 SMB3.1☆17Apr 5, 2020Updated 6 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Jul 26, 2024Updated last year
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkit☆11Dec 9, 2020Updated 5 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 6 years ago
- This repository contains Splunk queries to hunt some anomalies☆47Jul 28, 2022Updated 3 years ago
- ☆12Jun 24, 2024Updated last year
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Presentation, Code & Resource Listings from VeeamON 2020 sessions☆14Jun 30, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Sep 14, 2025Updated 8 months ago
- ☆20May 7, 2026Updated last week
- A dependency free native implementation of Ethereum crypto functions missing from WebCrypto.☆16Feb 27, 2026Updated 2 months ago
- Extreme Networks EXOS Driver implementation for the NAPALM Network Automation Project☆12Jun 28, 2021Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆33Jan 1, 2020Updated 6 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- My Jupyter Notebooks☆37Mar 14, 2025Updated last year
- Code samples for Query relational data in Azure☆17Jun 10, 2020Updated 5 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Incident Response Report Using GitHub-Sphinx☆21Oct 28, 2019Updated 6 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated 2 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 9 years ago
- Monitor Unused IAM Roles 🎓☆13Apr 30, 2021Updated 5 years ago