intezer / linux-explorer
Easy-to-use live forensics toolbox for Linux endpoints
☆406Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for linux-explorer
- A fully functional DanderSpritz lab in 2 commands☆419Updated 5 years ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 4 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- Remote Recon and Collection☆447Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆821Updated 7 years ago
- FAME Automates Malware Evaluation☆862Updated this week
- Next Generation Firewall Audit and Bypass Tool☆260Updated 7 years ago
- Web App for Volatility framework☆380Updated this week
- Modular file scanning/analysis framework☆616Updated 5 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆379Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆537Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆997Updated 4 years ago
- A Python Package for Data Exfiltration☆763Updated 6 months ago
- Differential Analysis of Malware in Memory☆209Updated 7 years ago
- Malware exploits☆538Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,247Updated 4 years ago
- First IDE for Nmap Script (NSE) Development.☆355Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,203Updated 4 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Various Tools and Docker Images☆278Updated 6 years ago
- Decept Network Protocol Proxy☆275Updated last year
- Empire client application☆491Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago