The gist at https://gist.github.com/vjt/5183305, just as a repo
☆22May 18, 2025Updated 10 months ago
Alternatives and similar repositories for copy-from-mac-time-machine
Users that are interested in copy-from-mac-time-machine are comparing it to the libraries listed below
Sorting:
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- macOS main menu bar utility menu☆20Feb 12, 2026Updated last month
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- Links Panel, collecting all the links on a page☆16Jun 19, 2025Updated 9 months ago
- A friendly orchestrator platform from the future☆17Updated this week
- CyLR - Live Response Collection Tool☆10Jul 14, 2020Updated 5 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Portable Activity Timeline that draws the Timeline based on data given in JSON or CSV format. By clicking on any activity a detailed moda…☆12Apr 6, 2023Updated 2 years ago
- Windows Forensics Salt States☆21Mar 11, 2026Updated last week
- Extract texts + their page numbers from PDF☆13Nov 25, 2024Updated last year
- Incident Response automation scripts☆16Sep 5, 2025Updated 6 months ago
- The graphics segment of Dwarf Fortress☆81Dec 24, 2016Updated 9 years ago
- ☆17Sep 9, 2020Updated 5 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- 🗂️ Universal Cross-Platform native s3 Object Storage GUI and FileManager☆22Jan 11, 2026Updated 2 months ago
- A forensic system baselining, searching, and evidence collection tool☆19Sep 4, 2019Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- High performance time ordered PCAP merging utility☆23Jun 20, 2022Updated 3 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- ruby library and executable to (de)crypt various router/switch password (IOS, NXOS, JunOS)☆18Oct 4, 2023Updated 2 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- ☆11Nov 27, 2021Updated 4 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- A Drafts App URL action to create gists.☆20Jan 27, 2013Updated 13 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆20Jun 7, 2021Updated 4 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- ☆18Jul 27, 2017Updated 8 years ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated 2 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Mar 13, 2026Updated last week
- Define an errata in table format (CSV) and then apply it to an arbitrary source. Inspired by RFC Errata, lets you keep your own errata in …☆21Aug 24, 2015Updated 10 years ago