cbranan / Anti-ForensicsLinks
☆17Updated 8 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Penguin OS Forensic (or Flight) Recorder☆40Updated 7 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆80Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- URL fingerprinting made easy☆87Updated last year
- ☆24Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 6 months ago
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Carbon Black Response IR tool☆54Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 3 months ago
- ☆15Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆37Updated 2 months ago
- Learning volatility plugins.☆19Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago