A quick reference guide for python script development in DFIR
☆17Mar 20, 2024Updated last year
Alternatives and similar repositories for python-forensics-handbook
Users that are interested in python-forensics-handbook are comparing it to the libraries listed below
Sorting:
- This is to edit a training forensic image file (raw/dd) and zero out all the unnecessary files.☆11Jun 21, 2025Updated 8 months ago
- Fork this repo! Do a Pull Request! As many times as you want! Learn the ins and outs of how to contribute to GitHub! Make your mistakes h…☆14Jun 21, 2024Updated last year
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Some security scripts i used☆15Jan 25, 2021Updated 5 years ago
- Script to process PDF files☆21May 23, 2025Updated 9 months ago
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 7 months ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 3 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Code for the Python Digital Forensics Cookbook☆69Nov 23, 2017Updated 8 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- L.I.A.M is an open source case management system for digital forensics labs. Law-Enforcement Investigations and Asset Management☆13Jul 4, 2025Updated 7 months ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Bash script to Check for malicious Cryptomining☆38Aug 19, 2018Updated 7 years ago
- ☆11Oct 13, 2025Updated 4 months ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- A home internet server configuration for the BeagleBone Black, Raspberry Pi or Cubieboard☆10Jun 16, 2014Updated 11 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- A config file that's curated for DFIR examiners with shortcuts to common Windows artifacts and settings enabled that help make your life …☆39Jan 6, 2025Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Jul 18, 2022Updated 3 years ago
- Hosting PowerShell in Python☆43Jun 17, 2022Updated 3 years ago
- Rule check for Adblock filter. Mirror of https://arestwo.org/famlam/redundantRuleChecker.html (might be disappear soon). Now avaiable at …☆11Nov 28, 2025Updated 3 months ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Daylight Linux operating system for Raspberry Pi and computers☆12Jan 25, 2020Updated 6 years ago
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago