Advanced Bash script designed for conducting digital forensics on Linux systems
☆146Apr 10, 2024Updated last year
Alternatives and similar repositories for Digital-Forensics-Script-for-Linux
Users that are interested in Digital-Forensics-Script-for-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Dec 29, 2023Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- ☆35Dec 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated 2 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- Forensic Artifact Collection Tool for macOS☆119Jul 28, 2025Updated 8 months ago
- Collection of forensic tools☆694Jan 12, 2026Updated 2 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆702Oct 22, 2025Updated 5 months ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 2 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- PowerShell Digital Forensics & Incident Response Scripts.☆781Jan 14, 2026Updated 2 months ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,288Mar 28, 2026Updated last week
- Practical Windows Forensics Training☆761Feb 16, 2026Updated last month
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆207Nov 12, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆349Jul 21, 2025Updated 8 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Jan 14, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆172Mar 31, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆14Mar 3, 2024Updated 2 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Aug 12, 2025Updated 7 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- ☆21Aug 31, 2022Updated 3 years ago
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.☆334Apr 14, 2023Updated 2 years ago
- ☆12Mar 28, 2026Updated last week
- Windows Forensics Environment Builder☆182Updated this week