sandflysecurity / sandfly-forensic-scriptsLinks
Small scripts to help with Linux forensics and incident response.
☆56Updated 3 months ago
Alternatives and similar repositories for sandfly-forensic-scripts
Users that are interested in sandfly-forensic-scripts are comparing it to the libraries listed below
Sorting:
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- A tool for mapping cyber crime☆236Updated this week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆194Updated last week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆71Updated last week
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆189Updated last year
- NTP Exfiltration Tool☆147Updated 2 years ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆109Updated 6 months ago
- ☆49Updated 11 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 3 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- ☆56Updated last year
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆143Updated last year
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated last month
- A collection of tools that I use in CTF's or for assessments☆107Updated 11 months ago
- ☆83Updated 2 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Updated 10 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated 2 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- ☆29Updated 3 years ago
- Rebuild of portspoof in GO with additional features.☆28Updated 3 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆67Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated last month
- ☆81Updated 3 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year