honeynet / forensic_challenges
THP Forensic Challenges
☆21Updated last year
Alternatives and similar repositories for forensic_challenges:
Users that are interested in forensic_challenges are comparing it to the libraries listed below
- Hashes of infamous malware☆26Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- ☆33Updated 3 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- ☆21Updated 2 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- ☆22Updated 4 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- ☆12Updated 2 years ago
- Python - Metasploit-Framework Database Management☆15Updated 4 years ago
- Computer Security Nuggets -- > Ctf writeups + Explore, Research, Study, Fun and Learning Security☆3Updated last month
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- recon-ng modules for Censys☆37Updated last year
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago