CLI utility and Python module for analyzing log files and other data.
☆159Aug 7, 2024Updated last year
Alternatives and similar repositories for logdissect
Users that are interested in logdissect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Apache Logfile Security Analyzer☆213Feb 22, 2019Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Mar 13, 2026Updated last week
- ☆21May 8, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Aspirational stuff☆15May 30, 2017Updated 8 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- Programmable API gateway micro framework☆17Jun 20, 2019Updated 6 years ago
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Updated this week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- A framework for orchestrating forensic collection, processing and data export☆345Updated this week
- Tools and library to manipulate EFI variables.☆10Mar 13, 2026Updated last week
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆111Feb 18, 2024Updated 2 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆488Feb 21, 2021Updated 5 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆11Oct 9, 2016Updated 9 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆220Aug 24, 2023Updated 2 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 11 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆51Feb 11, 2014Updated 12 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆480Nov 15, 2024Updated last year
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Linux assembly programs☆18Updated this week
- Super timeline all the things☆2,034Feb 10, 2026Updated last month
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago