DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).
☆16Dec 20, 2019Updated 6 years ago
Alternatives and similar repositories for DeployREMnux
Users that are interested in DeployREMnux are comparing it to the libraries listed below
Sorting:
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Feb 10, 2026Updated 3 weeks ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- It's not just UsnJrnl (USN Journal Records/Change Journal Records) parser.☆23Nov 11, 2018Updated 7 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- ☆21Oct 16, 2020Updated 5 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 5 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Jul 12, 2022Updated 3 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Extract compressed memory pages from page-aligned data☆47Sep 25, 2018Updated 7 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- It is based on bulk_extractor (https://github.com/simsong/bulk_extractor) and add scanners for record carving☆42Apr 23, 2020Updated 5 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- I2P Daemon written in Rust☆14Apr 7, 2017Updated 8 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- ☆11Jul 10, 2024Updated last year
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago