Tools to search through massive amounts of data
☆21Oct 20, 2025Updated 4 months ago
Alternatives and similar repositories for search2018
Users that are interested in search2018 are comparing it to the libraries listed below
Sorting:
- ☆25Aug 14, 2015Updated 10 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Python pcap sanitizer☆21Sep 2, 2022Updated 3 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago
- A Python package to search & delete messages from mailboxes in Office 365 using Microsoft Graph API☆25Feb 15, 2022Updated 4 years ago
- A list of Autopsy awesome plugins.☆76Jan 20, 2022Updated 4 years ago
- ☆227Nov 9, 2023Updated 2 years ago
- Sysmon configuration file templates with advanced event tracing and blocking☆41Updated this week
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆15Sep 7, 2025Updated 5 months ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- EML file rendering tool☆47Aug 29, 2021Updated 4 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- ChatGPT-like chat bot webapp built with React, Express and TailwindCSS using ollama.ai as backend.☆13Nov 23, 2023Updated 2 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- vncreplay replays a VNC session from captured network traffic☆10Apr 15, 2025Updated 10 months ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 5 months ago
- Parser for $UsnJrnl on NTFS☆120Nov 27, 2022Updated 3 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago