clingeric / forensic-toolkitLinks
☆52Updated 6 years ago
Alternatives and similar repositories for forensic-toolkit
Users that are interested in forensic-toolkit are comparing it to the libraries listed below
Sorting:
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆87Updated 3 weeks ago
- Windows Forensics Environment Builder☆159Updated last month
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆189Updated 6 months ago
- IOCs collected during day-to-day activities☆77Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆169Updated last month
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- a curated, categorised collection of useful projects 👨👩👧☆121Updated 2 weeks ago
- ☆52Updated 2 months ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆34Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆91Updated 7 months ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆85Updated 5 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- ☆67Updated last month
- ☆134Updated 2 years ago
- Just some lists of Malware Configs☆172Updated 9 months ago
- Sniffing out well-known threat groups☆61Updated last year
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆133Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 6 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- ☆123Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆276Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆202Updated this week
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆40Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 8 months ago