A collection of anti-forensics scripts
☆29Oct 19, 2025Updated 4 months ago
Alternatives and similar repositories for anti-forensics
Users that are interested in anti-forensics are comparing it to the libraries listed below
Sorting:
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- ☆22May 29, 2020Updated 5 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Mar 14, 2018Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Probably the first ELF binary infector ever created in Nim.☆28Jun 23, 2020Updated 5 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Rethinking the User Interface of AI☆32Updated this week
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆10Sep 7, 2023Updated 2 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- ExtraHop public code examples☆36Feb 2, 2026Updated 3 weeks ago
- ☆13Aug 28, 2025Updated 6 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- ☆13Nov 5, 2024Updated last year
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- My personal profile!☆17Oct 25, 2024Updated last year
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Amazon S3 bucket spelunking!☆87Aug 23, 2017Updated 8 years ago
- Hadoop interface for Xiaomi Open Storage☆13Apr 10, 2023Updated 2 years ago
- bitCollector - DFIR (Digital Forensics and Incident Response) Triage Collector☆13Aug 18, 2025Updated 6 months ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- ☆16May 13, 2021Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- ☆10Jul 23, 2015Updated 10 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month