CLI utility and Python module for analyzing log files and other data.
☆158Aug 7, 2024Updated last year
Alternatives and similar repositories for logdissect
Users that are interested in logdissect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Apache Logfile Security Analyzer☆214Feb 22, 2019Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 8 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Mar 27, 2026Updated 2 weeks ago
- ☆21May 8, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Apr 26, 2018Updated 7 years ago
- Programmable API gateway micro framework☆17Jun 20, 2019Updated 6 years ago
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Mar 30, 2026Updated last week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆40May 3, 2021Updated 4 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 7 months ago
- A framework for orchestrating forensic collection, processing and data export☆345Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tools and library to manipulate EFI variables.☆10Mar 26, 2026Updated 2 weeks ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆110Feb 18, 2024Updated 2 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Rack middleware that to add cat facts in headers of HTTP responses.☆12Apr 17, 2018Updated 7 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Python wrapper around TCPdump for finer grained search criteria on Linux systems.☆14Jan 20, 2019Updated 7 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆10Oct 9, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- Python IOC Editor☆66Mar 10, 2015Updated 11 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆51Feb 11, 2014Updated 12 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆482Nov 15, 2024Updated last year
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆18Mar 24, 2026Updated 2 weeks ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Super timeline all the things☆2,048Feb 10, 2026Updated 2 months ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago