cyberark / White-PhoenixLinks
A tool to recover content from files encrypted with intermittent encryption
☆233Updated 4 months ago
Alternatives and similar repositories for White-Phoenix
Users that are interested in White-Phoenix are comparing it to the libraries listed below
Sorting:
- ☆161Updated last year
- A repository of credential stealer formats☆218Updated 2 weeks ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆80Updated last week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- A ProcessMonitor visualization application written in rust.☆181Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆362Updated 10 months ago
- CLI tools for forensic investigation of Windows artifacts☆342Updated 7 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆76Updated last year
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆173Updated 2 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆142Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last week
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated last month
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆321Updated last month
- Map tracking ransomware, by OCD World Watch team☆468Updated 3 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated last month
- PowerShell tools to help defenders hunt smarter, hunt harder.☆401Updated 2 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆254Updated 3 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- Another Hardening Windows Tool☆51Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆183Updated 2 weeks ago
- Collection of forensic tools☆641Updated last month
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆210Updated 5 months ago
- ☆201Updated 7 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆188Updated 4 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆252Updated last year
- God Mode Detection Rules☆134Updated 10 months ago
- Windows Malware Investigation Scripts & Docs☆83Updated 7 months ago