it-forensics / forensics
Knowledge space for some computerforensic stuff
☆14Updated 10 years ago
Alternatives and similar repositories for forensics:
Users that are interested in forensics are comparing it to the libraries listed below
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- See here:☆42Updated 12 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- An advanced memory forensics framework☆25Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Just a collection of scripts☆40Updated 5 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated last month
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- In this project we made a web browser forensic tool which recover deleted history,cache and cookies of chorme and mozilla. The tool simpl…☆15Updated 9 years ago
- ☆17Updated 8 years ago
- Scapy docs, examples, scripts and other stuff☆40Updated 10 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆19Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- shell script to create an image and perform initial examination on a drive☆15Updated 5 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Automated Memory Forensic☆35Updated 6 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago