yogsec / Digital-Forensics-ToolsLinks
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.
☆95Updated 8 months ago
Alternatives and similar repositories for Digital-Forensics-Tools
Users that are interested in Digital-Forensics-Tools are comparing it to the libraries listed below
Sorting:
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 8 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆152Updated last month
- ☆140Updated 6 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆236Updated last year
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆311Updated last month
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆161Updated 9 months ago
- OSINT Tools for the Dark Web☆224Updated 8 months ago
- 100 Hacking Tools and Resources☆110Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Updated last year
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, cr…☆26Updated 9 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆55Updated 8 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆116Updated 9 months ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆106Updated 2 years ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆120Updated 9 months ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆201Updated 3 months ago
- Complete Roadmap for Penetration Testing☆252Updated last year
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆36Updated 2 years ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 11 months ago
- ☆73Updated 11 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆226Updated 8 months ago
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆100Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆213Updated 2 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆78Updated last year
- Learn how to conduct advanced searching of the World Wide Web☆282Updated 5 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆223Updated 3 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 7 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 10 months ago