sandflysecurity / sandfly-forensic-scriptsLinks
Small scripts to help with Linux forensics and incident response.
β50Updated last month
Alternatives and similar repositories for sandfly-forensic-scripts
Users that are interested in sandfly-forensic-scripts are comparing it to the libraries listed below
Sorting:
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β120Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)β36Updated 2 weeks ago
- β44Updated 4 months ago
- π An up-to-date collection of precompiled binaries and hacking scripts.β41Updated 2 weeks ago
- Protection against HTML smuggling attacks.β96Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated this week
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), aβ¦β51Updated 4 months ago
- β53Updated 11 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file hβ¦β86Updated 2 months ago
- β65Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPCβ115Updated last month
- Modular framework for automating triaging, malware analysis, and analyst workflowsβ41Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β121Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ91Updated 3 months ago
- β32Updated 7 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netwβ¦β147Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcpβ64Updated 3 weeks ago
- Nuke It From Orbit - remove AV/EDR with physical accessβ261Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β167Updated 9 months ago
- Analyse MSI files for vulnerabilitiesβ137Updated 10 months ago
- Top 400 passwords as per HaveIBeenPwnedβ22Updated 9 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysisβ61Updated 10 months ago
- A collection of tools that I use in CTF's or for assessmentsβ102Updated 5 months ago
- Analyze pcaps with Zeek and a Grafana Dashboardβ178Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β48Updated this week
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs β¦β44Updated last month
- β67Updated 5 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperationsβ81Updated 2 months ago