A Repository to Track Anti-Forensic Techniques
☆119Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Everything related to Linux Forensics☆719Jul 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 6 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 7 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- ☆60Dec 15, 2023Updated 2 years ago
- Deleting Shadow Copies In Pure C++☆120Oct 31, 2022Updated 3 years ago
- ☆19Sep 17, 2025Updated 7 months ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆499Nov 29, 2022Updated 3 years ago
- ☆58Mar 28, 2026Updated last month
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆139Dec 20, 2022Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 3 years ago
- Dump the memory of any PPL with a Userland exploit chain☆352Mar 17, 2023Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- ☆20Sep 24, 2025Updated 7 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆264Mar 13, 2024Updated 2 years ago
- USN Journal full path builder☆69Apr 16, 2026Updated 2 weeks ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- C++ self-Injecting dropper based on various EDR evasion techniques.☆431Feb 11, 2024Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆116Aug 29, 2022Updated 3 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆244Sep 26, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 10 months ago
- collection of apis used in malware development☆231Aug 2, 2022Updated 3 years ago
- ☆16May 3, 2024Updated 2 years ago