☆22Nov 22, 2025Updated 4 months ago
Alternatives and similar repositories for OSDFIR-Lab
Users that are interested in OSDFIR-Lab are comparing it to the libraries listed below
Sorting:
- ☆17Jan 21, 2026Updated 2 months ago
- We took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.☆57Mar 14, 2026Updated last week
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated 3 weeks ago
- Quick ESXi Log Parser☆30Oct 20, 2025Updated 5 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- A python script for smart lightbulbs to show how badly you're losing money☆38Apr 28, 2025Updated 10 months ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆24Updated this week
- ☆12Aug 23, 2019Updated 6 years ago
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- Helm charts for running open source digital forensic tools in Kubernetes☆187Mar 12, 2026Updated last week
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 6 months ago
- ☆96Jan 7, 2026Updated 2 months ago
- ☆13Jan 19, 2023Updated 3 years ago
- ☆19May 30, 2022Updated 3 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- Official Deployment Scripts for Learning Locker☆11Apr 30, 2025Updated 10 months ago
- Utility to quickly view bidirectional encodings for code hosted online☆23Nov 2, 2021Updated 4 years ago
- Automatically create iSCSI targets for all drives except for a boot device☆25May 23, 2025Updated 10 months ago
- This repo contains the installation guide and EFI files required to get a perfectly functional macOS hackintosh on your Lenovo Thinkbook …☆14Jun 2, 2025Updated 9 months ago
- A list of resources to build a information security team.☆14Feb 10, 2021Updated 5 years ago
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- Overview of MS Defender☆118Feb 20, 2026Updated last month
- Modeling and simulation of ICS devices☆13Mar 6, 2026Updated 2 weeks ago
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆100Aug 4, 2025Updated 7 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆108Mar 16, 2026Updated last week
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 9 months ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year