cbranan / Anti-ForensicsLinks
☆17Updated 8 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 5 months ago
- Searching .evtx logs for remote connections☆23Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆42Updated last year
- External telegram feeder for AIL framework☆13Updated last month
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- ☆54Updated 5 months ago
- ☆28Updated 4 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated this week
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated last week
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 4 months ago
- ☆45Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- ☆24Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago