intezer / linux-explorer
Easy-to-use live forensics toolbox for Linux endpoints
☆405Updated last year
Alternatives and similar repositories for linux-explorer:
Users that are interested in linux-explorer are comparing it to the libraries listed below
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 7 years ago
- A fully functional DanderSpritz lab in 2 commands☆426Updated 5 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆467Updated 4 years ago
- Web App for Volatility framework☆380Updated 4 months ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆301Updated 4 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆468Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Updated 4 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆381Updated 2 years ago
- Differential Analysis of Malware in Memory☆211Updated 8 years ago
- Python framework for IT security tools☆266Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆504Updated 4 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆813Updated 9 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- Machinae Security Intelligence Collector☆512Updated 11 months ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- Remote Recon and Collection☆450Updated 7 years ago
- Created by Jin Qian via the GitHub Connector☆434Updated last year
- Incident Response Forensic Framework☆600Updated 5 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- A modular Python application to collect intelligence for malicious hosts.☆265Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆576Updated 6 years ago
- FAME Automates Malware Evaluation☆890Updated this week
- Empire client application☆495Updated 3 years ago