A collection of anti-forensics scripts
☆30Oct 19, 2025Updated 5 months ago
Alternatives and similar repositories for anti-forensics
Users that are interested in anti-forensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- for the louise☆242Aug 9, 2020Updated 5 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- This repository hosts the documentation for the mixminion protocol☆11May 26, 2010Updated 15 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆140Mar 14, 2018Updated 8 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- small utility to dump kernel memory☆26Jul 23, 2014Updated 11 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementations of common data structures in C☆16Jul 20, 2022Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Development repository for the snort cookbook☆27Mar 2, 2026Updated last month
- ☆21Aug 7, 2014Updated 11 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Access a MPR121 breakout using Node.js from a Raspberry Pi or BeagleBone Black.☆10May 20, 2023Updated 2 years ago
- A simple menu system for the Adafruit PiTFT for Raspberry Pi☆11Nov 23, 2016Updated 9 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- ☆10Jul 23, 2015Updated 10 years ago
- A minimal tasks/calendar management system☆20Oct 26, 2024Updated last year
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Simple asynchronous back end for Slack apps☆12Jan 12, 2023Updated 3 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- ITL☆15Feb 19, 2019Updated 7 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago