honeynet / forensic_challengesLinks
THP Forensic Challenges
☆22Updated last year
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below
Sorting:
- List of default passwords for Industrial Control Systems☆75Updated 8 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ☆30Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Scripts I have made for blue team☆16Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Computer Security Nuggets -- > Ctf writeups + Explore, Research, Study, Fun and Learning Security☆3Updated last week
- ☆39Updated 4 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- ☆11Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- recon-ng modules for Censys☆37Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Presentation Slides and Resources☆16Updated last year
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆26Updated last week
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 6 months ago