it-forensics / forensics
Knowledge space for some computerforensic stuff
β14Updated 10 years ago
Alternatives and similar repositories for forensics:
Users that are interested in forensics are comparing it to the libraries listed below
- In this project we made a web browser forensic tool which recover deleted history,cache and cookies of chorme and mozilla. The tool simplβ¦β15Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)β14Updated 7 years ago
- Digital Forensics and Incident Response Wikiβ40Updated 10 years ago
- A short and small memory forensics helper.β52Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Notβ¦β50Updated 3 years ago
- Static and automated/dynamic malware analysisβ46Updated 9 years ago
- Just a collection of scriptsβ40Updated 4 years ago
- An advanced memory forensics frameworkβ25Updated 10 years ago
- The Swiss army knife of byte manipulationβ43Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 8 years ago
- This version touches disk for registry persistence.β25Updated 9 years ago
- Because I can't find scripts to do this anywhere else...β25Updated 8 years ago
- shell script to create an image and perform initial examination on a driveβ15Updated 4 years ago
- Small scripts for doing repeatable tasksβ25Updated 2 years ago
- Working Rsh Client With Bind/Reverse Shellβ20Updated 9 years ago
- Download all malicious files from a Kippo SSH honeypot databaseβ23Updated 10 years ago
- See here:β42Updated 12 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend prβ¦β2Updated 5 years ago
- Proof of Concepts, Exploitsβ28Updated 6 years ago
- Twitter Bot to perform advanced search and automated responseβ13Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.β17Updated 10 months ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will proβ¦β81Updated 11 years ago
- A network data locater using credentials obtained during penetration testsβ32Updated 11 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malwareβ18Updated 9 years ago
- Metasploit Usage Wikiβ49Updated 9 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.β20Updated 8 years ago
- Scapy Penetration testing scriptsβ22Updated 9 years ago
- Discover potential timestamps within the Windows Registryβ18Updated 10 years ago
- post-exploitation toolsβ15Updated 6 years ago
- Wi-Fi Backdoorsβ37Updated 9 years ago