intezer / linux-explorer
Easy-to-use live forensics toolbox for Linux endpoints
☆407Updated 6 months ago
Related projects: ⓘ
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 4 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆377Updated 6 years ago
- 16,432 Free Yara rules created by☆378Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆519Updated 7 years ago
- Web App for Volatility framework☆378Updated last week
- (extensible) Data Exfiltration Toolkit (DET)☆817Updated 6 years ago
- A fully functional DanderSpritz lab in 2 commands☆418Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆463Updated 3 years ago
- ☆710Updated this week
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,199Updated 4 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆460Updated 4 years ago
- ☆390Updated this week
- ☆316Updated this week
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆536Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,234Updated 4 years ago
- ☆192Updated this week
- Scripts that are useful for me on pen tests☆523Updated 2 years ago
- FAME Automates Malware Evaluation☆845Updated 2 weeks ago
- Remote Recon and Collection☆447Updated 6 years ago
- Modular file scanning/analysis framework☆616Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Updated 4 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆489Updated last year
- Blue Team Scripts☆239Updated 5 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,027Updated 3 years ago
- Next Generation Firewall Audit and Bypass Tool☆259Updated 7 years ago
- ☆505Updated 3 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆798Updated 2 months ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- Decept Network Protocol Proxy☆274Updated last year
- Automates some pentest jobs via nmap xml file☆318Updated 6 years ago