cbranan / Anti-ForensicsLinks
☆17Updated 8 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Penguin OS Forensic (or Flight) Recorder☆40Updated 9 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 7 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- A repository dedicated to tracking ransomware families based on leaked builders.☆23Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- ☆15Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Updated last year
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆17Updated 8 months ago
- Repository resource threat intelligence for SOC☆10Updated 7 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago