honeynet / forensic_challengesLinks
THP Forensic Challenges
☆24Updated 2 years ago
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below
Sorting:
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆30Updated 7 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- List of default passwords for Industrial Control Systems☆77Updated 8 years ago
- ☆21Updated 2 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- ☆11Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- ☆28Updated 6 years ago
- ☆12Updated 2 years ago
- Simple Live Data Collection Tool☆22Updated 5 years ago
- an awesome list of honeypot resources☆10Updated 8 years ago