Powershell / C# based cross platform forensic framework based for live incident response
☆23Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for IRCoreForensicFramework
Users that are interested in IRCoreForensicFramework are comparing it to the libraries listed below
Sorting:
- Tools by cooey comrades for cooey comrades.☆16Feb 23, 2023Updated 3 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- ☆16May 15, 2025Updated 10 months ago
- ☆13Jan 20, 2020Updated 6 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Snort 2.9.8.x on Ubuntu 16 LTS with Barnyard2, PulledPork, and Snorby☆11Apr 10, 2016Updated 9 years ago
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 3 years ago
- ☆11May 2, 2022Updated 3 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆159Oct 30, 2025Updated 4 months ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago