A collection of anti-forensics scripts
☆30Oct 19, 2025Updated 7 months ago
Alternatives and similar repositories for anti-forensics
Users that are interested in anti-forensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- This repository hosts the documentation for the mixminion protocol☆11May 26, 2010Updated 15 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆140Mar 14, 2018Updated 8 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- small utility to dump kernel memory☆26Jul 23, 2014Updated 11 years ago
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 11 years ago
- Implementations of common data structures in C☆16Jul 20, 2022Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 12 years ago
- A lightweight easy to use package to parse text from PDF files on client side without any server dependency.☆12Jun 16, 2024Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Development repository for the snort cookbook☆27Apr 21, 2026Updated last month
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- This app is used to poll and alert if a new Home appears in daft.☆11Dec 9, 2022Updated 3 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 8 months ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Access a MPR121 breakout using Node.js from a Raspberry Pi or BeagleBone Black.☆10May 20, 2023Updated 3 years ago
- A simple menu system for the Adafruit PiTFT for Raspberry Pi☆11Nov 23, 2016Updated 9 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 5 years ago
- ☆10Jul 23, 2015Updated 10 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 9 years ago
- A minimal tasks/calendar management system☆20Oct 26, 2024Updated last year
- Advices to look for malicious software on your devices☆17May 6, 2020Updated 6 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An ARP based Operating System version scanner☆15Jan 21, 2013Updated 13 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Simple asynchronous back end for Slack apps☆12Jan 12, 2023Updated 3 years ago
- ITL☆15Feb 19, 2019Updated 7 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- ☆13Apr 14, 2014Updated 12 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 7 years ago