☆16May 4, 2017Updated 8 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 9, 2018Updated 7 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆23Oct 5, 2019Updated 6 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- 🔫 lkm module for emergency binary/script execution☆12Dec 22, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Sep 13, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- A simple & naïve virtual camera.☆10Jan 6, 2019Updated 7 years ago
- This is an open-source repository of cybersecurity curricular modules for K-12☆50Jul 18, 2024Updated last year
- ⛔️ 🚫 ⚠️ 从 Greatfire Analyzer 爬取的在中国大陆被屏蔽的域名列表。Domains blocked in China mainland crawled from Greatfire Analyzer.☆10Updated this week
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Code supporting the RustLab 2023 Robotic Sumo Workshop☆10Nov 19, 2023Updated 2 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆22Nov 12, 2024Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆26Nov 22, 2025Updated 5 months ago
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- 🛡 Check Windows and Control Configs and Security - CWiCCS (read as QUICKS)☆13Jan 14, 2023Updated 3 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆44Jan 18, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆25May 23, 2025Updated 11 months ago
- use E5 graph apis☆11Jul 6, 2023Updated 2 years ago
- [译] ApacheCN 安卓译文集☆11Jan 11, 2022Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- Mirror of the OpenDaylight usc gerrit project☆12Sep 21, 2020Updated 5 years ago
- Terraform module for Cloudera Manager☆11May 6, 2020Updated 5 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Write-ups for FireEye's FLARE-On challenges☆25Aug 8, 2019Updated 6 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Automate Cisco LAN Switching Configuration using Ansible☆13Sep 4, 2020Updated 5 years ago
- Quick module to deploy a Linux VM to Azure with Ansible installed at bootup - by @JesseLoudon☆11Apr 4, 2026Updated 3 weeks ago
- My i3 config and various scripts. Abandoned due to migration to awesome☆15Aug 6, 2024Updated last year