Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.
☆31Aug 28, 2025Updated 8 months ago
Alternatives and similar repositories for TrailBytes
Users that are interested in TrailBytes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Portable Windows forensic tool for reviewing Firefox-like and Chromium-based browser artifacts, with labeling, search, CLI processing, an…☆57May 10, 2026Updated last week
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Esta es una extensión del proyecto original de Avilla Forensics☆16Nov 18, 2025Updated 6 months ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆43Oct 24, 2025Updated 6 months ago
- Deep Packet Inspection • Traffic Forensics • Network Threat Detection☆52Feb 20, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- macOS Artifacts☆33Mar 2, 2025Updated last year
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆65Dec 18, 2024Updated last year
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 8 years ago
- A structured 90-day cybersecurity study plan for beginners (2025). Covers certifications (Network+, Security+), Linux, Python, Wireshark,…☆44Mar 8, 2025Updated last year
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 3 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆55Nov 20, 2024Updated last year
- Velociraptor Server hosted in Azure App Service☆58Jun 4, 2025Updated 11 months ago
- ☆27Apr 7, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆109May 7, 2026Updated 2 weeks ago
- ☆23Mar 12, 2025Updated last year
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆35Jan 9, 2025Updated last year
- Keylogger for Windows that goes unnoticed by the antivirus☆32Dec 4, 2024Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆483Oct 29, 2025Updated 6 months ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Mar 31, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Notes only☆21May 2, 2022Updated 4 years ago
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆45Feb 1, 2026Updated 3 months ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 8 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 9 months ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated last year
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- 🥳 Record GIFs and share them with your friends☆13Nov 15, 2025Updated 6 months ago
- ☆43Oct 11, 2023Updated 2 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆32Dec 20, 2025Updated 5 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆189Feb 9, 2025Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year