paulveillard / cybersecurity-macOS-iOS-security
An ongoing collection of awesome macOS and iOS security tools, software, libraries, learning tutorials, frameworks, academic and practical resources.
☆14Updated 2 years ago
Related projects: ⓘ
- Curated list of ransomware-related resources; awesome style.☆12Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆32Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆15Updated 2 years ago
- ☆34Updated 9 months ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- An ongoing collection infosec courses, learning tutorials, libaries, and training resources.☆41Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated 6 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆79Updated 5 months ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- ☆17Updated last year
- This script is to build Wazuh 4.3 environment☆13Updated 2 years ago
- ☆15Updated 10 months ago
- Sniffing out well-known threat groups☆28Updated last month
- URL fingerprinting made easy☆80Updated 5 months ago
- mift - a mobile image forensic toolkit☆39Updated 10 months ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- List of sources for cybersecurity news☆32Updated last year
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆40Updated 2 weeks ago
- New Framework Red Team Operations☆17Updated 3 years ago
- ☆14Updated last year