codejanus / study_SecurityLinks
☆22Updated 8 years ago
Alternatives and similar repositories for study_Security
Users that are interested in study_Security are comparing it to the libraries listed below
Sorting:
- Extracts Windows user info including the password hashes☆40Updated 9 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆50Updated last year
- Backstage Parser☆32Updated 3 years ago
- Windows anti-forensics USB monitoring tool.☆71Updated 2 years ago
- Windows 10 Live Information viewer☆37Updated 3 years ago
- ☆25Updated 2 years ago
- A list of Autopsy awesome plugins.☆75Updated 3 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆14Updated 7 years ago
- CyberChef update scripts in PowerShell & Bash☆17Updated last year
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆87Updated 2 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Custom Maltego transforms☆68Updated 10 years ago
- Learning volatility plugins.☆19Updated 4 years ago
- Malquarium - Modern Malware Repository☆47Updated last week
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- ☆14Updated 5 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆93Updated 3 weeks ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆38Updated 4 months ago
- ☆33Updated 10 months ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆28Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆94Updated 4 years ago