Digital Forensics and Incident Response Wiki
☆40May 19, 2014Updated 11 years ago
Alternatives and similar repositories for dfirwiki
Users that are interested in dfirwiki are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 10 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 3 months ago
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Oct 22, 2018Updated 7 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- ☆13Apr 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- I2P bindings for Twisted.☆15Aug 2, 2022Updated 3 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Bypassing Android Pattern Lock☆68Apr 16, 2014Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago