dasec / fishy
Toolkit for Filesystem based Data Hiding Techniques.
☆38Updated 5 years ago
Alternatives and similar repositories for fishy:
Users that are interested in fishy are comparing it to the libraries listed below
- Forensic Analysis Tool for Btrfs File System.☆21Updated 6 years ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 2 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆49Updated 8 years ago
- Ghidra plugin for https://analyze.intezer.com☆70Updated 2 years ago
- Tools to generate a Debian Linux distribution with chipsec to test hardware requirements☆47Updated last week
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆22Updated 2 years ago
- ☆17Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated last month
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 2 months ago
- ☆19Updated 3 years ago
- A FUSE module to mount captured network data☆36Updated last week
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆112Updated 2 months ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Skeleton project for your own GRUB-based bootkit☆15Updated 5 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆65Updated 3 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆58Updated 4 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- volatility explorer☆91Updated 4 years ago
- Linpmem is a linux memory acquisition tool☆77Updated 9 months ago
- ☆11Updated 2 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆62Updated 7 years ago
- Scapy hands-on☆35Updated last year
- AFF is an open and extensible file format to store disk images and associated metadata.☆85Updated 11 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- XOR Key Extractor☆50Updated 6 months ago