vertrex / DFFLinks
DFF (Digital Forensics Framework)
☆11Updated 4 years ago
Alternatives and similar repositories for DFF
Users that are interested in DFF are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- ☆23Updated 2 years ago
- ☆25Updated 3 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- ☆14Updated 7 years ago
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago
- C# User Simulation☆33Updated 3 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆30Updated 7 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago