Resources for DFIR. And more.
☆11Jul 3, 2024Updated last year
Alternatives and similar repositories for DFIR-Resources
Users that are interested in DFIR-Resources are comparing it to the libraries listed below
Sorting:
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- ☆22Feb 3, 2026Updated last month
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 28, 2026Updated last week
- This repo includes all my codings, analytics and documentation for my AWS DeepRacer Competition☆11Oct 4, 2023Updated 2 years ago
- Incident Response documents and tooling☆113Dec 23, 2025Updated 2 months ago
- Anvilogic Forge☆116Sep 18, 2025Updated 5 months ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- Aspose.Email for Python via .NET Examples: https://products.aspose.com/email/python-net☆10Oct 9, 2025Updated 4 months ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆16Aug 31, 2025Updated 6 months ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- ☆10Aug 1, 2020Updated 5 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- ☆11Aug 15, 2024Updated last year
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Updated this week
- ☆15Apr 10, 2025Updated 10 months ago
- Python library for easy handling of disk-images☆12Feb 11, 2026Updated 3 weeks ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- OCI images for the curious.☆12Mar 21, 2022Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- A functional type system for policy inspection, audit and enforcement.☆13Aug 17, 2023Updated 2 years ago
- This is to edit a training forensic image file (raw/dd) and zero out all the unnecessary files.☆11Jun 21, 2025Updated 8 months ago
- CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)☆11Nov 30, 2023Updated 2 years ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 8 months ago
- ☆15Updated this week
- A library for measurements and quantities☆12Jan 13, 2024Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- Bibliothèque SEDA et exemples d'usage☆16Feb 27, 2026Updated last week
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 6 months ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago