☆33Apr 20, 2012Updated 13 years ago
Alternatives and similar repositories for MacResponse-Forensics
Users that are interested in MacResponse-Forensics are comparing it to the libraries listed below
Sorting:
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- MBSE BBS☆14Aug 21, 2021Updated 4 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Feb 19, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/mac-osx-forensics☆28Jan 12, 2016Updated 10 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- A Mach-O binary codesign remover.☆40Mar 21, 2015Updated 10 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Resources for HFS+ Forensics☆37Nov 15, 2015Updated 10 years ago
- ☆13Aug 3, 2016Updated 9 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Ipsumdump and other programs for command-line network trace manipulation.☆40Feb 16, 2024Updated 2 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Snort DPDK DAQ module with multiqueue support - Primarily for Napatech NICs☆29Dec 7, 2018Updated 7 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- DOS Program Development☆13Nov 9, 2022Updated 3 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- A Frida script to bypass SSL pinning in Instagram 157.0 and later (iOS)☆11Sep 20, 2020Updated 5 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- In this project a robot that can be operated by authorized person or operator is implemented. For this purpose we use a face re…☆12Jun 20, 2018Updated 7 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Using Raspberry Pi, Python, MQTT, Home Assistant, a relay, and a magnetic proximity sensor, I open, close, stop, and report the status of…☆11Nov 7, 2016Updated 9 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Plugin metademands for GLPI☆12Feb 20, 2026Updated last week
- A Mach-O Load Command deobfuscator.☆43Nov 25, 2021Updated 4 years ago
- ☆109Nov 21, 2013Updated 12 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- A set of tools to convert ANSi and artscene related file formats into PNG images☆56Apr 19, 2017Updated 8 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago