DFIRLab / Plateforme d'investigation numérique
☆15Jul 6, 2021Updated 4 years ago
Alternatives and similar repositories for DFIRLab
Users that are interested in DFIRLab are comparing it to the libraries listed below
Sorting:
- ☆69May 3, 2021Updated 4 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- ☆18Jan 18, 2022Updated 4 years ago
- Honeypot for file uploads. Written in Go.☆16Feb 14, 2026Updated last month
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- Volatility3 Linux profiles☆76Dec 8, 2025Updated 3 months ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Tutorial for Writing a Kernel☆10Jun 5, 2022Updated 3 years ago
- ☆54May 14, 2024Updated last year
- LiteX-based PCIe MITM, sniffing, fuzzing, device emulation☆19Feb 9, 2022Updated 4 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Displays simulated agent data on an interactable dashboard, including radar, data tables and more.☆10Jan 19, 2024Updated 2 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- Native Powers Talk demos☆15Jan 30, 2026Updated last month
- Simple tool to perform HTML Smuggling.☆67Aug 17, 2021Updated 4 years ago
- Sneak is URL transfer tool based on Tor and Curl.☆14Dec 6, 2018Updated 7 years ago
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- ☆16Aug 29, 2023Updated 2 years ago
- A guide to help you start with StarLoco☆13Jan 14, 2025Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- Simple python tool to search http://ixirc.com/☆10Apr 16, 2019Updated 6 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 4 months ago
- Twitter API 2.0を使ってツイート(ポスト)する☆16Jul 5, 2025Updated 8 months ago