Tor Web Scraper, dnmap CnC, and Forensic Disk Analyzer
☆17May 25, 2017Updated 8 years ago
Alternatives and similar repositories for forensic-tools
Users that are interested in forensic-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- My Windows Boxstarter with WSL (Ubuntu)☆16Sep 26, 2018Updated 7 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- AWS lambda function to ship ELB, S3, CloudTrail, VPC, CloudFront logs to Logmatic.io☆12Mar 5, 2018Updated 8 years ago
- 平时用到的注入模板☆19Nov 16, 2017Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Motor de búsqueda para filtrar por todas las máquinas de HackTheBox que s4vitar ha hecho.☆12Dec 8, 2022Updated 3 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Copy xRAT repository☆23May 15, 2018Updated 7 years ago
- Baidu 100G Chasiss Switch hardware spec☆12Sep 20, 2017Updated 8 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Nov 29, 2017Updated 8 years ago
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- Android Phone FireWall , it could help you to filter the boring Message and unknow Call.☆13May 22, 2013Updated 12 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- A simple AWS Boto3 script to trigger EBS Snapshots using Lambda Functions🎓☆21Apr 5, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Extracting and analyzing URLs from Emails for phishing events☆22Mar 28, 2026Updated 2 weeks ago
- A proxy designed to lie.☆25Jan 26, 2013Updated 13 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated 2 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- A lambda function to push GuardDuty Findings to SNS Topic 🎓☆18Apr 7, 2021Updated 5 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- ☆18Feb 4, 2016Updated 10 years ago