Powershell / C# based cross platform forensic framework based for live incident response
☆23Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for IRCoreForensicFramework
Users that are interested in IRCoreForensicFramework are comparing it to the libraries listed below
Sorting:
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Snort 2.9.8.x on Ubuntu 16 LTS with Barnyard2, PulledPork, and Snorby☆11Apr 10, 2016Updated 9 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ☆16May 15, 2025Updated 9 months ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 5 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- 该资源为恶意代码检测与识别的相关链接汇总,希望对您有所帮助!☆21Jun 27, 2020Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- Subvenkon is a subdomain enumerator from Venkon☆22Jun 22, 2020Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Clipboard access notification inspired by iOS 14☆22Jun 30, 2020Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆316Dec 19, 2023Updated 2 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago