☆77Oct 16, 2022Updated 3 years ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- ☆247Jul 9, 2024Updated last year
- MAES: M365 Analyzer & Extractor Suite Po☆33Feb 14, 2026Updated last month
- ☆11Apr 2, 2022Updated 4 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- ☆25Jan 4, 2023Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Jul 20, 2023Updated 2 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- A Python package to search & delete messages from mailboxes in Office 365 using Microsoft Graph API☆25Feb 15, 2022Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Fun tools around the EBS Direct API☆20Apr 16, 2021Updated 4 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- MacOSX Privilege Escalation Research☆31Sep 9, 2021Updated 4 years ago
- ☆400Sep 25, 2023Updated 2 years ago
- ☆18Feb 2, 2026Updated 2 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Interactive Microsoft Graph search tool using console GUI for various Microsoft 365 and Azure AD object types.☆49Apr 8, 2025Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago