dForensics Tools
☆22Sep 12, 2015Updated 10 years ago
Alternatives and similar repositories for Tools
Users that are interested in Tools are comparing it to the libraries listed below
Sorting:
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- ☆17Sep 4, 2023Updated 2 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Python library for parsing AccessData AD1 images☆34Jun 1, 2023Updated 2 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 4 years ago
- Extract $MFT record info and log it to a csv file.☆288Oct 7, 2024Updated last year
- Shows a tiny bar in your tmux statusline with the current CPU usage☆14Aug 25, 2017Updated 8 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 4 months ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Oct 15, 2020Updated 5 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Create styles and themes for your Python desktop applications☆16Mar 21, 2022Updated 4 years ago