Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.
☆32Aug 28, 2025Updated 6 months ago
Alternatives and similar repositories for TrailBytes
Users that are interested in TrailBytes are comparing it to the libraries listed below
Sorting:
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆40Oct 24, 2025Updated 4 months ago
- Deep Packet Inspection • Traffic Forensics • Network Threat Detection☆50Feb 20, 2026Updated last month
- macOS Artifacts☆33Mar 2, 2025Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆64Dec 18, 2024Updated last year
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 7 years ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- A structured 90-day cybersecurity study plan for beginners (2025). Covers certifications (Network+, Security+), Linux, Python, Wireshark,…☆33Mar 8, 2025Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆59Jan 5, 2026Updated 2 months ago
- ☆23Jan 27, 2025Updated last year
- Enrich your investigations on IPs, Domains etc. with OSINT☆59Apr 4, 2024Updated last year
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆103Updated this week
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- ☆24Mar 12, 2025Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆476Oct 29, 2025Updated 4 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- Notes only☆20May 2, 2022Updated 3 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 6 months ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Explore the globe like never before with World Explorer. Our AI-powered app gives you in-depth insights about any place worldwide, provid…☆13May 23, 2025Updated 9 months ago
- A Shiny Web App tutorial inspecting the COVID-19 (2019-nCoV) epidemic, data from https://github.com/CSSEGISandData/COVID-19/tree/master/c…☆10Apr 18, 2020Updated 5 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- ☆43Oct 11, 2023Updated 2 years ago
- 析镜 LensAnalysis是一款基于 Volatility 3 框架的图形化内存取证工具,专为 CTF 竞赛和安全研究设计。☆35Feb 28, 2026Updated 3 weeks ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Docs, scripts, helpers, and more to configure your environment easily for .NET MAUI development☆14Aug 1, 2024Updated last year
- RNNs for sql-injection detection 🔍. built in python with tensorflow and keras☆12Sep 14, 2024Updated last year