Network Forensic Extendable Analysis Tool
☆39May 22, 2022Updated 3 years ago
Alternatives and similar repositories for NetfoxDetective
Users that are interested in NetfoxDetective are comparing it to the libraries listed below
Sorting:
- ☆19Jan 31, 2025Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- ☆27May 6, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- ☆57Jan 28, 2024Updated 2 years ago
- ☆15Oct 14, 2021Updated 4 years ago
- A better visualisation of data.gov.in☆19May 17, 2013Updated 12 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- ☆78Jan 15, 2026Updated last month
- ☆16Jul 17, 2024Updated last year
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- ☆99Sep 15, 2025Updated 5 months ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- Forensic tool for examining Thumbs.db files☆14Jun 5, 2013Updated 12 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- Simple patcher tool to turn off TLS handshake validation in golang binaries☆12Apr 23, 2022Updated 3 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Updated this week
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week