cbranan / Anti-Forensics
☆17Updated 7 years ago
Alternatives and similar repositories for Anti-Forensics:
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Penguin OS Forensic (or Flight) Recorder☆39Updated 2 months ago
- ☆24Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆42Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- ☆41Updated 11 months ago
- Learning volatility plugins.☆19Updated 4 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- External telegram feeder for AIL framework☆14Updated 2 weeks ago
- ☆32Updated last year
- Evtx Log (xml) Browser☆56Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆52Updated 2 months ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last week
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated last month
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Lazarus analysis tools and research report☆55Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year