Create lab environment for Linux Command Line course
☆49Sep 24, 2024Updated last year
Alternatives and similar repositories for LinuxCmdLine
Users that are interested in LinuxCmdLine are comparing it to the libraries listed below
Sorting:
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Jan 2, 2023Updated 3 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- ☆12Mar 27, 2024Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Repo to hold mcp server for velociraptor☆29Jul 27, 2025Updated 7 months ago
- ☆20Jan 28, 2026Updated last month
- Windows Malware Investigation Scripts & Docs☆85Nov 8, 2024Updated last year
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆433Jan 15, 2026Updated last month
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆179Jan 20, 2026Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆150Feb 1, 2026Updated last month
- ☆11Feb 9, 2023Updated 3 years ago
- Scrapes Audit Logs From Cloudflare and Streams to Std Out☆11May 6, 2025Updated 9 months ago
- This repository dedicated to collect SIEM practice labs (Splunk and Elastic) from various cybersecurity training platforms☆49Dec 15, 2025Updated 2 months ago
- ☆38Mar 19, 2025Updated 11 months ago
- ☆39Jul 1, 2023Updated 2 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- Forensic Artifact Collection Tool Matrix☆95Nov 9, 2024Updated last year
- IJduino☆15Sep 5, 2016Updated 9 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- ☆11Jun 6, 2016Updated 9 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,242Feb 18, 2026Updated last week
- ☆43Apr 18, 2023Updated 2 years ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆39Updated this week
- A Web Self Service Application for Generating OpenC2 Commands☆10Sep 26, 2019Updated 6 years ago
- Semi-sequential universally unique identifiers☆12Mar 22, 2017Updated 8 years ago
- examples for the Hackaday.io LED Programming With Arduino and FastLED class with Mirabelle Jones and Cathy Laughlin☆13Oct 2, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Fully sync two secure-scuttlebutt databases over a duplex stream.☆15Jun 13, 2018Updated 7 years ago
- Diagnostic and management tools for cjdns☆11Nov 20, 2019Updated 6 years ago
- "Hey, webpack? Why don't you see me." - said leveldown.☆11Feb 8, 2026Updated 2 weeks ago
- Frida depends on Vala☆11Feb 16, 2026Updated last week
- a federated wiki plugin for datscript☆12Jun 26, 2015Updated 10 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Notifications using Shoutrrr in GitHub Actions☆15Dec 9, 2025Updated 2 months ago
- higher order functions for function composition, laziness, backtracking, and other magic☆18Jun 8, 2019Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago