cbranan / Anti-ForensicsLinks
☆16Updated 8 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- ☆80Updated 2 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Updated 7 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Evtx Log (xml) Browser☆57Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Forensic Imaging quickstarts!☆13Updated 3 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Updated last year
- Data exfiltration and covert communication tool☆39Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- Learning volatility plugins.☆18Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- ☆54Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Updated 4 months ago
- Reads and prints information from the website MalAPI.io☆39Updated 4 years ago