tarahmarie / investigationsView external linksLinks
☆77Oct 16, 2022Updated 3 years ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Updated this week
- ☆11Apr 2, 2022Updated 3 years ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆27Mar 2, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆20May 30, 2025Updated 8 months ago
- ☆14Jun 20, 2022Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- ☆17Sep 9, 2020Updated 5 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆51Updated this week
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆401Sep 25, 2023Updated 2 years ago
- ☆18Feb 2, 2026Updated 2 weeks ago
- Scripts for MacOS related tasks.☆18Feb 16, 2020Updated 6 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago