intezer / linux-explorer
Easy-to-use live forensics toolbox for Linux endpoints
☆405Updated last year
Alternatives and similar repositories for linux-explorer
Users that are interested in linux-explorer are comparing it to the libraries listed below
Sorting:
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 5 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- A fully functional DanderSpritz lab in 2 commands☆427Updated 6 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆467Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Web App for Volatility framework☆380Updated 5 months ago
- Remote forensics meta tool☆465Updated last month
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆412Updated last year
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369Updated 11 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- ☆507Updated 4 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆368Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 8 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Differential Analysis of Malware in Memory☆211Updated 8 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- A low to medium interaction honeypot.☆467Updated last year
- Powershell-based Windows Security Auditing Toolbox☆577Updated 6 years ago
- A modular Python application to collect intelligence for malicious hosts.☆268Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,273Updated 3 months ago
- VirusTotal Full api☆298Updated 2 years ago
- Remote Recon and Collection☆450Updated 7 years ago
- Modular file scanning/analysis framework☆618Updated 5 years ago