dhondta / AppmemDumper
Forensics triage tool relying on Volatility and Foremost
☆24Updated last year
Alternatives and similar repositories for AppmemDumper:
Users that are interested in AppmemDumper are comparing it to the libraries listed below
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago
- ☆22Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆11Updated 7 years ago
- Repository of Information sharing on threats and indicators☆12Updated 4 years ago
- ☆17Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- Speaking materials from conferences I've given☆9Updated 2 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- ☆24Updated last year
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Oracle Attacks Tool☆13Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- Work in Progress repo☆14Updated 5 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago