shell script to create an image and perform initial examination on a drive
☆15Feb 28, 2020Updated 6 years ago
Alternatives and similar repositories for forensics
Users that are interested in forensics are comparing it to the libraries listed below
Sorting:
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- An advanced memory forensics framework☆25Sep 25, 2014Updated 11 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- In this project we made a web browser forensic tool which recover deleted history,cache and cookies of chorme and mozilla. The tool simpl…☆17May 13, 2015Updated 10 years ago
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Transform to check if email is registered on Facebook.com☆23Sep 14, 2012Updated 13 years ago
- Forensic Scripts☆155Mar 28, 2025Updated 11 months ago
- Hybrid client emulator (python and C++) for Metin2.☆19Oct 14, 2016Updated 9 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- Digital Forensics XML project and library☆68Jul 2, 2021Updated 4 years ago
- USB Impersonator☆34Aug 17, 2021Updated 4 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- Bypassing Android Pattern Lock☆69Apr 16, 2014Updated 11 years ago
- Digital Forensics project☆60Oct 11, 2019Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 4 months ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- This tool will allow Forensic Investigators retrieve saved data from Google Chrome such as saved passwords and usernames, searches, histo…☆26Aug 7, 2017Updated 8 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- cbReader - A simple web-based comic book reader (CBZ/CBR)☆10May 21, 2018Updated 7 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆35Feb 2, 2022Updated 4 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Updated this week
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- ☆14Dec 5, 2025Updated 2 months ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago