Digital Forensics and Incident Response Wiki
☆40May 19, 2014Updated 11 years ago
Alternatives and similar repositories for dfirwiki
Users that are interested in dfirwiki are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 11 years ago
- Digital Forensics date and time☆23Apr 12, 2026Updated 3 weeks ago
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- PwnWiki - The notes section of the pentesters mind.☆563Oct 22, 2018Updated 7 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- ☆13Apr 21, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 12 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated last year
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- I2P bindings for Twisted.☆15Aug 2, 2022Updated 3 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Bypassing Android Pattern Lock☆70Apr 16, 2014Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago