yogsec / Digital-Forensics-ToolsLinks
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.
☆97Updated 9 months ago
Alternatives and similar repositories for Digital-Forensics-Tools
Users that are interested in Digital-Forensics-Tools are comparing it to the libraries listed below
Sorting:
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆53Updated 9 months ago
- ☆143Updated 7 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆239Updated last year
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆154Updated last month
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆168Updated 9 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆312Updated last week
- OSINT Tools for the Dark Web☆225Updated 9 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆55Updated 9 months ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆206Updated 4 months ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆106Updated 2 years ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆207Updated 9 months ago
- ☆73Updated last year
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 9 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆118Updated 10 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆38Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- OSCP Cheatsheet by Sai Sathvik☆84Updated 2 years ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆123Updated 10 months ago
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analy…☆205Updated last year
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆36Updated last year
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆99Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆257Updated 9 months ago
- Complete Roadmap for Penetration Testing☆259Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆253Updated 6 months ago
- this repository made to help me All Dorking repositories find for one location☆34Updated 4 months ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆213Updated 2 years ago
- Minimalist notes for CEH-practical Cert.☆39Updated 3 years ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆312Updated this week
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year