secwest / fast-fwsign
☆27Updated 7 months ago
Alternatives and similar repositories for fast-fwsign:
Users that are interested in fast-fwsign are comparing it to the libraries listed below
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆17Updated last week
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Linux #rootkit and #malware revealer☆24Updated 8 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- The core backend server handling API requests and task management☆38Updated 2 weeks ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 7 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 5 months ago
- ☆15Updated 4 years ago
- Yara rules☆21Updated 2 years ago
- ☆23Updated 2 years ago
- Examine Chrome extensions for security issues☆81Updated last month
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 5 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Dissect triage script for Citrix NetScaler devices☆23Updated 10 months ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated last month
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- ☆33Updated last year
- ☆14Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- Rules shared by the community from 100 Days of YARA 2025☆32Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- CSIRT Jump Bag☆26Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 7 months ago