da3n3rys / DFIR-NotebooksView external linksLinks
Jupyter Notebooks for Digital Forensics & Incident Response
☆10Nov 23, 2021Updated 4 years ago
Alternatives and similar repositories for DFIR-Notebooks
Users that are interested in DFIR-Notebooks are comparing it to the libraries listed below
Sorting:
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago
- ☆14Feb 25, 2022Updated 3 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- ☆16Jul 19, 2021Updated 4 years ago
- Simple volatility profile builder based on Docker container☆21Aug 24, 2020Updated 5 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Aug 4, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated last month
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- ☆13Sep 9, 2022Updated 3 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Feb 2, 2022Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- ☆12Oct 23, 2020Updated 5 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆35Jun 26, 2023Updated 2 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- ☆10Jun 13, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A distilled DeepSeek-R1 variant built on Qwen2.5-32B, fine-tuned with curated data for enhanced performance and efficiency. <metadata> gp…☆16Mar 11, 2025Updated 11 months ago
- Join us to create the first predictive augmentative communication platform for speech-impaired children!☆11Aug 9, 2023Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Didactic Web crawler for Web Search Engines (CS 6913) course at NYU☆10Dec 8, 2022Updated 3 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- A config file that's curated for DFIR examiners with shortcuts to common Windows artifacts and settings enabled that help make your life …☆39Jan 6, 2025Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Jul 18, 2022Updated 3 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- ☆13Dec 14, 2021Updated 4 years ago