Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourceforge.net/
☆53Jan 10, 2013Updated 13 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below
Sorting:
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- ☆21Jan 12, 2012Updated 14 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆30Jan 9, 2025Updated last year
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 7 months ago
- A DNS database debugger☆36Sep 9, 2022Updated 3 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- SIEM in a box☆81Feb 24, 2026Updated last week
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Jan 23, 2025Updated last year
- ☆10Nov 24, 2018Updated 7 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago