intezer / linux-explorer
Easy-to-use live forensics toolbox for Linux endpoints
☆407Updated 10 months ago
Alternatives and similar repositories for linux-explorer:
Users that are interested in linux-explorer are comparing it to the libraries listed below
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆300Updated 4 years ago
- Web App for Volatility framework☆381Updated last month
- A fully functional DanderSpritz lab in 2 commands☆423Updated 5 years ago
- 16,432 Free Yara rules created by☆382Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆262Updated 7 years ago
- Differential Analysis of Malware in Memory☆212Updated 7 years ago
- Remote Recon and Collection☆448Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆825Updated 7 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Remote forensics meta tool☆466Updated 7 months ago
- Powershell C2 Server and Implants☆574Updated 5 years ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆640Updated last month
- Builds malware analysis Windows VMs so that you don't have to.☆1,036Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆539Updated last year
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,207Updated 4 years ago
- Malware exploits☆538Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Updated 4 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- ☆507Updated 3 years ago
- A tool to retrieve malware directly from the source for security researchers.☆562Updated 7 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago