☆77Oct 16, 2022Updated 3 years ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 4 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- ☆246Jul 9, 2024Updated last year
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆52Updated this week
- ☆17Sep 9, 2020Updated 5 years ago
- ☆401Sep 25, 2023Updated 2 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- ☆18Feb 2, 2026Updated last month