nesfit / NetfoxDetective
Network Forensic Extendable Analysis Tool
☆39Updated 2 years ago
Alternatives and similar repositories for NetfoxDetective:
Users that are interested in NetfoxDetective are comparing it to the libraries listed below
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- ☆39Updated 5 years ago
- CyberChef update scripts in PowerShell & Bash☆16Updated 11 months ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Parses the WMI object database....looking for persistence☆31Updated 5 years ago
- Fast incident overview☆39Updated 8 years ago
- ☆11Updated 6 years ago
- Extracts Windows user info including the password hashes☆40Updated 8 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ☆31Updated 4 months ago
- Git for me to put all my forensics stuff☆21Updated 2 months ago
- Registry Explorer bookmark definitions☆41Updated 3 months ago
- Windows Thingies in Python for live use.☆24Updated 5 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated 7 months ago
- OSSEM Modular☆27Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Tools and Binaries to use with KAPE☆12Updated 5 years ago
- Capture-Py is a malware analysis tool that makes a copy of any files deleted or modified in a given directory and sub-directories. It was…☆23Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Cisco AMP threat hunting scripts☆14Updated 5 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- LNK to JSON☆14Updated 6 years ago