BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.
☆32Jan 1, 2020Updated 6 years ago
Alternatives and similar repositories for BlueSploit
Users that are interested in BlueSploit are comparing it to the libraries listed below
Sorting:
- ☆17Mar 21, 2019Updated 6 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 8 months ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Jul 25, 2021Updated 4 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 6 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Python bindings for https://github.com/omerbenamram/mft☆23Dec 23, 2025Updated 2 months ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 4 years ago
- ☆44Jul 11, 2025Updated 7 months ago