arvindpj007 / Digital-Forensics-Report
This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.
☆15Updated 4 years ago
Related projects: ⓘ
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- ☆22Updated this week
- Threat Hunt Investigation Methodology and Procedure☆14Updated 2 years ago
- ☆21Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- ☆86Updated this week
- Sniffing out well-known threat groups☆28Updated last month
- ☆61Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- ☆18Updated this week
- ☆16Updated 6 months ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 2 months ago
- ☆14Updated 3 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- Packet Analysis on Steroids☆10Updated last year
- Easy to configure Honeypot for Blue Team☆39Updated 3 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- ☆59Updated 3 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆14Updated 4 months ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆24Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated last year
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago