Tool and framework for securely reading untrusted USB mass storage devices.
☆368Feb 27, 2026Updated last week
Alternatives and similar repositories for usbsas
Users that are interested in usbsas are comparing it to the libraries listed below
Sorting:
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆55Oct 12, 2024Updated last year
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Feb 21, 2024Updated 2 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,056Oct 14, 2025Updated 4 months ago
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆475Sep 14, 2024Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- Network Security Sniffer☆842Jan 2, 2026Updated 2 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,056Dec 11, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- A python app using kivy and pynput to log and upload mouse dynamics.☆27Apr 24, 2022Updated 3 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆786Feb 22, 2026Updated 2 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,467Mar 2, 2026Updated last week
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆172Mar 6, 2023Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- PoC analyzer of your email address exposure on various services☆65Oct 9, 2023Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- ☆215Dec 2, 2025Updated 3 months ago
- Carve file metadata from NTFS index ($I30) attributes☆71Feb 3, 2024Updated 2 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆388Jan 20, 2026Updated last month
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆697Oct 22, 2025Updated 4 months ago
- Avilla Forensics FREE☆983Dec 10, 2025Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆88Sep 14, 2024Updated last year
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago