FOR508 Index - GCFA
☆24May 19, 2018Updated 7 years ago
Alternatives and similar repositories for FOR508_Index
Users that are interested in FOR508_Index are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Aug 29, 2024Updated last year
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- ☆14Aug 24, 2020Updated 5 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- A DFIR tool to collect artifacts on macOS☆56Mar 1, 2020Updated 6 years ago
- Malice VirusTotal Plugin☆12Feb 24, 2019Updated 7 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆19Dec 11, 2025Updated 3 months ago
- Incident Response documents and tooling☆113Dec 23, 2025Updated 3 months ago
- Indexes for SANS Courses and GIAC Certifications☆280May 26, 2024Updated last year
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆153Nov 15, 2023Updated 2 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- ☆14Oct 24, 2024Updated last year
- ☆16Mar 10, 2017Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- ☆100Oct 22, 2025Updated 5 months ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆24Aug 4, 2023Updated 2 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Latest copy of Sysinternals from live.sysinternals.com☆18Mar 25, 2014Updated 11 years ago
- Digital Forensics Artifacts Knowledge Base☆90Dec 23, 2025Updated 3 months ago
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- ☆12Oct 1, 2021Updated 4 years ago