dhondta / AppmemDumper
Forensics triage tool relying on Volatility and Foremost
☆24Updated 9 months ago
Related projects: ⓘ
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆10Updated 5 years ago
- ☆22Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆13Updated 6 months ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 3 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 4 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 7 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- A rogue DNS detector☆23Updated 11 months ago
- ☆12Updated 6 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆11Updated 3 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Repository of Information sharing on threats and indicators☆12Updated 4 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- ☆12Updated 3 years ago
- ☆9Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago