Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.
☆17Oct 28, 2023Updated 2 years ago
Alternatives and similar repositories for crackdown
Users that are interested in crackdown are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Mount VSCs with ease!☆18Jan 22, 2025Updated last year
- ☆12Dec 23, 2021Updated 4 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- ☆12Aug 27, 2025Updated 7 months ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Sharing Knowledge "Hands On Scraping Data dengan kasus Analisis Sentimen pada Kebijakan Pemerintah"☆23May 28, 2025Updated 10 months ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 11 months ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 7 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Mar 3, 2022Updated 4 years ago
- ☆33Dec 4, 2022Updated 3 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- Web Desktop App Using Integrated Extjs 4.2 and Node.js☆14Apr 6, 2016Updated 10 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 7 months ago
- Postman collection to work with Sophos Central APIs☆26Jan 8, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆16Oct 29, 2023Updated 2 years ago
- personal fork of OSINT tool recon-ng☆16Dec 17, 2017Updated 8 years ago
- ☆16Jan 9, 2025Updated last year
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆17Sep 28, 2018Updated 7 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- Python library for managing Arbor Peakflow SP.☆20May 26, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security resear…☆30Jan 14, 2026Updated 3 months ago
- A small end-to-end prober and Prometheus stats exporter for a Matrix homeserver☆11Oct 26, 2023Updated 2 years ago
- A way to control devices via Bluetooth w/ an ESP32☆13Jul 6, 2024Updated last year
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- A Polymer element to parse, validate, manipulate, and display dates using Moment.js.☆14Apr 2, 2019Updated 7 years ago
- Powerful checksum generator!☆13Jul 28, 2016Updated 9 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago