☆16May 4, 2017Updated 8 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- ☆18Nov 9, 2018Updated 7 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Dec 31, 2019Updated 6 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆23Oct 5, 2019Updated 6 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- 🔫 lkm module for emergency binary/script execution☆12Dec 22, 2017Updated 8 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Sep 13, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Clear diverses Logs and History Files saved by Windows.☆23Oct 24, 2017Updated 8 years ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated 2 years ago
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- This is an open-source repository of cybersecurity curricular modules for K-12☆50Jul 18, 2024Updated last year
- A simple Metadata Removal Tool for images and videos using exiftool and ffmpeg in C and Python3.☆116Nov 23, 2025Updated 3 months ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 4 months ago
- Pastebin Monitoring as a Service☆73Feb 26, 2014Updated 12 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- 🛡 Check Windows and Control Configs and Security - CWiCCS (read as QUICKS)☆13Jan 14, 2023Updated 3 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆45Jan 18, 2024Updated 2 years ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆23May 23, 2025Updated 9 months ago
- ☆39Nov 24, 2022Updated 3 years ago
- Produces a suitable .gitlab-ci.yml file from a Golang TXT Template to work as input for a parent/child triggered GitLab CICD pipeline.☆11Mar 9, 2026Updated last week
- WinDbg plugin to trace module transitions from a debugged driver.☆47Dec 22, 2025Updated 3 months ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Terraform module for Cloudera Manager☆11May 6, 2020Updated 5 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Aug 8, 2019Updated 6 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 8 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Automate Cisco LAN Switching Configuration using Ansible☆13Sep 4, 2020Updated 5 years ago