Sh0ckFR / french-ezines
French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.
☆57Updated last month
Related projects ⓘ
Alternatives and complementary repositories for french-ezines
- Algorithme d'apprentissage statistique permettant de créer un mod èle sur les lignes de commandes des évènements "Création de Processus", …☆79Updated 9 months ago
- ☆55Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆29Updated last week
- This aims to be a collection of tools to forensically analyze Active Directory databases☆20Updated 2 weeks ago
- Tuoni☆63Updated this week
- All kinds of tiny shells☆59Updated last year
- Canary Detection☆162Updated 7 months ago
- Generate graphs and charts based on password cracking result☆154Updated last year
- ☆127Updated 3 months ago
- Rapports techniques de VIGINUM☆30Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Powershell Linter☆46Updated 2 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated this week
- ☆16Updated 7 months ago
- Docker images of the Exegol project☆89Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆144Updated last year
- Guide journalisation Microsoft☆57Updated 4 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆11Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆120Updated 3 weeks ago
- ☆17Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆134Updated last week
- Memory mapping profiles for forensic analysis using volatility 2☆45Updated 2 years ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆30Updated 3 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- Compile SharpHound and others on Linux☆20Updated 3 months ago
- ☆40Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆141Updated 2 months ago
- ☆24Updated last year