Forensics acquisition framework designed to be extensible and secure
☆125Jun 21, 2019Updated 6 years ago
Alternatives and similar repositories for dexter
Users that are interested in dexter are comparing it to the libraries listed below
Sorting:
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆49Jul 19, 2024Updated last year
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- DFF (Digital Forensics Framework) is a Forensics Framework coming with command line and graphical interfaces. DFF can be used to investig…☆301Feb 13, 2020Updated 6 years ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- ☆17Oct 26, 2018Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Remote forensics meta tool☆474Mar 21, 2025Updated 11 months ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 6 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆631Jan 11, 2024Updated 2 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- ☆27Oct 22, 2018Updated 7 years ago
- Integration with Slack API☆15Dec 10, 2023Updated 2 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Automation and Scaling of Digital Forensics Tools☆785Feb 19, 2026Updated last week
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- A framework for orchestrating forensic collection, processing and data export☆343Feb 18, 2026Updated last week
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆306May 7, 2025Updated 9 months ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Automate SSH key management☆66Oct 26, 2022Updated 3 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆527Jun 26, 2021Updated 4 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- ☆21Jun 1, 2018Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago