Jupyter Notebooks for Digital Forensics & Incident Response
☆10Nov 23, 2021Updated 4 years ago
Alternatives and similar repositories for DFIR-Notebooks
Users that are interested in DFIR-Notebooks are comparing it to the libraries listed below
Sorting:
- ☆14Feb 25, 2022Updated 4 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- Simple volatility profile builder based on Docker container☆21Aug 24, 2020Updated 5 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Aug 4, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated last month
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- ☆12Sep 9, 2022Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆35Feb 2, 2022Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- ☆12Oct 23, 2020Updated 5 years ago
- Random notes collected on the intertubes relating to DFIR☆35Jun 26, 2023Updated 2 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Feb 27, 2026Updated last week
- Join us to create the first predictive augmentative communication platform for speech-impaired children!☆11Aug 9, 2023Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A distilled DeepSeek-R1 variant built on Qwen2.5-32B, fine-tuned with curated data for enhanced performance and efficiency. <metadata> gp…☆16Mar 11, 2025Updated 11 months ago
- Didactic Web crawler for Web Search Engines (CS 6913) course at NYU☆10Dec 8, 2022Updated 3 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- ☆10Jun 13, 2024Updated last year
- A config file that's curated for DFIR examiners with shortcuts to common Windows artifacts and settings enabled that help make your life …☆39Jan 6, 2025Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Jul 18, 2022Updated 3 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- ☆10Jan 22, 2025Updated last year
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago