☆18Apr 16, 2015Updated 10 years ago
Alternatives and similar repositories for linewatch
Users that are interested in linewatch are comparing it to the libraries listed below
Sorting:
- Parses for Google Analytic values in raw files like RAM, DD images etc.☆18Apr 17, 2016Updated 9 years ago
- Parse Manifest.mbdb files from iTunes backup directories☆20Jun 29, 2017Updated 8 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 6 months ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30May 7, 2019Updated 6 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Jul 28, 2020Updated 5 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- A sort of a toolkit to decrypt Dropbox Windows DBX files☆32Apr 30, 2017Updated 8 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Read a plist file, write out any embedded plist files☆36Dec 27, 2015Updated 10 years ago
- Digital Forensic Investigative Scripts☆87Updated this week
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆101Jun 2, 2021Updated 4 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- Windows Forensics Salt States☆21Updated this week
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- DNSSECChef: DNS/DNSSEC Interception Proxy☆37Mar 29, 2019Updated 6 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- ☆17Jan 21, 2026Updated 2 months ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- Python script to batch query the Tor Relays and Bridges☆38Mar 8, 2019Updated 7 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- Decode security descriptors in $Secure on NTFS☆22Feb 24, 2022Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago