BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.
☆32Jan 1, 2020Updated 6 years ago
Alternatives and similar repositories for BlueSploit
Users that are interested in BlueSploit are comparing it to the libraries listed below
Sorting:
- ☆17Mar 21, 2019Updated 6 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 7 months ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 8 months ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- dcfldd - enhanced version of dd for forensics and security☆71Jun 17, 2018Updated 7 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- A quick reference guide for python script development in DFIR☆17Mar 20, 2024Updated 2 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- ☆93Jul 30, 2025Updated 7 months ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 4 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year