☆12May 19, 2025Updated 9 months ago
Alternatives and similar repositories for avoiding-data-disasters
Users that are interested in avoiding-data-disasters are comparing it to the libraries listed below
Sorting:
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆12Oct 1, 2021Updated 4 years ago
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Mirage is a Cacti plugin designed to mirror SNMP polling data to file.☆10Apr 7, 2017Updated 8 years ago
- A very basic javascript generator for Girocode and Bezahlcode QR Codes that are used for bank transfers in Germany☆13Aug 23, 2025Updated 6 months ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Terraform code and Sentinel policies for HashiConf-2019 talk/demo☆10Sep 23, 2019Updated 6 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- Lab generation for final project in EC521. Used to teach students how to use some popular and powerful OSINT tools such as Maltego, h8mai…☆14Dec 14, 2019Updated 6 years ago
- Unofficial pdf/epub of the content of "re:Work" from Google Inc. Pdf/epub can be found here: https://github.com/daniperez/rework/releases☆11Jul 4, 2025Updated 8 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- A Synology Technical Add-On for Splunk☆12Sep 3, 2024Updated last year
- Rsources that are publicly available, these resources are linked to the SANS SEC598 Class☆21Feb 2, 2026Updated last month
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Splunk Technology Add-On for pfsense☆11Mar 30, 2022Updated 3 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13May 4, 2020Updated 5 years ago
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆18Jun 21, 2024Updated last year
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- ESPboy cellphone with GSM module based on SIM800 chip - ESP8266 privacy care hacker's phone☆10Oct 17, 2021Updated 4 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- ☆16Sep 25, 2025Updated 5 months ago
- Hunt malware with Volatility☆47Jul 9, 2025Updated 7 months ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Oct 16, 2025Updated 4 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago