ashemery / DFIR-ICTCS17
Digital Forensics and Incident Response (DFIR) Workshop
☆10Updated 7 years ago
Alternatives and similar repositories for DFIR-ICTCS17:
Users that are interested in DFIR-ICTCS17 are comparing it to the libraries listed below
- Random Tips and Writeups.☆13Updated 6 years ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ShellC0de Generator☆11Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Scan and decode NetWire logs☆11Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- ☆12Updated 4 years ago
- ☆33Updated 2 months ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 10 months ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Burp suite Certificate modification tool☆18Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- A location where I save and share notes about security topics.☆11Updated 4 years ago
- Scripts used during the investigation of LeoStrike (How to Hack Like a Rockstar)☆14Updated 7 years ago