Script for Forensic on Linux
☆48Feb 1, 2016Updated 10 years ago
Alternatives and similar repositories for IR_Tool
Users that are interested in IR_Tool are comparing it to the libraries listed below
Sorting:
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆26Jan 18, 2026Updated last month
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Apr 12, 2016Updated 9 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- ☆24Nov 3, 2019Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- R-CSIRT Linux Triage tool☆39Jun 28, 2018Updated 7 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Python script to parse PE header information☆17Dec 26, 2019Updated 6 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 4 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago