Linux Incident Response
☆90Sep 22, 2019Updated 6 years ago
Alternatives and similar repositories for TuxResponse
Users that are interested in TuxResponse are comparing it to the libraries listed below
Sorting:
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- ☆25May 9, 2021Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Endpoint detection & Malware analysis software☆230Dec 20, 2019Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- thethe☆115Oct 21, 2020Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Mar 12, 2020Updated 5 years ago
- A backdoor with a multitude of features.☆293Oct 3, 2024Updated last year
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆209Oct 19, 2020Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- ☆26Apr 5, 2020Updated 5 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆321Jun 25, 2024Updated last year
- Security event correlation engine for ELK stack☆447Jun 26, 2024Updated last year
- ☆20Jan 28, 2026Updated last month
- ☆18Jul 24, 2019Updated 6 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Dec 8, 2025Updated 2 months ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Web shell scanner and analyzer.☆113Jul 1, 2023Updated 2 years ago
- python hash cracker☆52Nov 18, 2024Updated last year
- Simple way to disable/rename buttons from a task manager☆30Feb 17, 2020Updated 6 years ago
- A Highly Accessible and Automated Virtualization Platform for Security Education☆195Jan 22, 2026Updated last month
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last month
- Web Application Vulnerability Scanner☆133Sep 25, 2020Updated 5 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Feb 27, 2025Updated last year