clr2of8 / DeployREMnux
DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).
☆16Updated 5 years ago
Alternatives and similar repositories for DeployREMnux:
Users that are interested in DeployREMnux are comparing it to the libraries listed below
- Site for IWS book content☆18Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Mass Triage Tools☆20Updated 2 months ago
- Git for me to put all my forensics stuff☆21Updated 3 months ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- ☆22Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 5 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 6 years ago
- Some rules, scripts of some use to us☆9Updated 6 months ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- ☆14Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago