rezaduty / awesome-forensics-1Links
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
☆15Updated 6 years ago
Alternatives and similar repositories for awesome-forensics-1
Users that are interested in awesome-forensics-1 are comparing it to the libraries listed below
Sorting:
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆22Updated 6 years ago
- ☆17Updated 7 years ago
- This tool helps inject code into the processes of Antivirus programs.☆156Updated 3 months ago
- Rapidly initialize Windows Sandbox for malware analysis and reverse engineering☆146Updated 2 months ago
- A YARA rule generator☆60Updated 3 weeks ago
- ☆97Updated last year
- Web应用防火墙,永久免费。☆25Updated 2 months ago
- ☆16Updated 8 years ago
- Clear diverses Logs and History Files saved by Windows.☆23Updated 8 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆110Updated 2 years ago
- Brute force cracking the compressed package | 暴力破解有密码的压缩包☆36Updated last year
- A command and control (C2) server☆58Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆85Updated 11 months ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Updated 3 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Updated 4 months ago
- Memory Scaner☆65Updated 3 years ago
- 🔫 lkm module for emergency binary/script execution☆12Updated 8 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated last year
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Updated 2 years ago
- A Linux persistence tool!☆159Updated 4 months ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆33Updated last year
- ☆60Updated last month
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆48Updated last year
- poc for cve-2025-53772☆46Updated last month
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆47Updated last month
- LD_PRELOAD Linux rootkit (x86 & ARM)☆25Updated 6 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- Volatility Explorer Suit☆66Updated 3 years ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Updated 5 months ago
- plugx rat c2, supports TCP, UDP, HTTP☆14Updated last year