naemazam / logForenixLinks
log Forenix 🕵️- Your Linux Forensic Artifacts Collector Tool! 🚀
☆30Updated last year
Alternatives and similar repositories for logForenix
Users that are interested in logForenix are comparing it to the libraries listed below
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 6 months ago
- ☆31Updated 2 years ago
- ☆24Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 8 months ago
- ☆19Updated 8 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆23Updated 8 months ago
- Sniffing out well-known threat groups☆64Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated 4 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 2 weeks ago
- ☆76Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- ☆52Updated 4 months ago
- ☆35Updated 9 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 3 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 10 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 7 months ago
- ☆56Updated 11 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Red Team Operations Framework☆22Updated last year