These are some of the commands which I use frequently during Malware Analysis and DFIR.
☆24Jan 8, 2024Updated 2 years ago
Alternatives and similar repositories for cheatsheet
Users that are interested in cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- ☆11Nov 13, 2024Updated last year
- A repository to host emojis used in the Digital Forensics Discord Server☆18May 28, 2022Updated 3 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploit for win10 SMB3.1☆17Apr 5, 2020Updated 6 years ago
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkit☆11Dec 9, 2020Updated 5 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 6 years ago
- PowerShell module for Office 365 and Azure log collection☆281Sep 22, 2025Updated 7 months ago
- ☆12Jun 24, 2024Updated last year
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Sep 14, 2025Updated 7 months ago
- Presentation, Code & Resource Listings from VeeamON 2020 sessions☆14Jun 30, 2020Updated 5 years ago
- A dependency free native implementation of Ethereum crypto functions missing from WebCrypto.☆16Feb 27, 2026Updated 2 months ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- My Jupyter Notebooks☆37Mar 14, 2025Updated last year
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆21Oct 28, 2019Updated 6 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆14Oct 21, 2021Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- A heatmap vizualization of bucketed ranged data over time.☆22Apr 1, 2013Updated 13 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆77Jan 19, 2026Updated 3 months ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago