#
forensics
Here are 508 public repositories matching this topic...
An Information Security Reference That Doesn't Suck
windows
linux
osx
reverse-engineering
hacking
forensics
penetration-testing
infosec
pentesting
references
information-security
privilege-escalation
exfiltration
infosec-reference
red-team
blueteam
hacking-simulator
privilege-escalation-exploits
mitre-attack-db
-
Updated
Jul 14, 2020
Free Security and Hacking eBooks
security
hacking
forensics
penetration-testing
ebooks
kali-linux
cyber-security
cloud-security
hacking-ebooks
hackers-handbook
-
Updated
Jul 10, 2019
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.
aws
security
cis
security-audit
cloud
aws-cli
assessment
forensics
compliance
hardening
security-hardening
hipaa
cloudtrail
gdpr
security-tools
cis-benchmark
aws-auditing
prowler
well-architected
-
Updated
Jul 17, 2020 - Shell
Official Black Hat Arsenal Security Tools Repository
-
Updated
Jan 27, 2020
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
-
Updated
Jul 17, 2020 - C
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
python
security
parser
python-library
macros
rtf
forensics
vba
compound
malware-analysis
pyparsing
olefile
ms-office-documents
ole-files
-
Updated
Jul 8, 2020 - Rich Text Format
linux
cryptography
rubber-ducky
network
reverse-engineering
hacking
forensics
steganography
infosec
web-security
pentesting
ctf
wargame
post-exploitation
vulnerabilities
iocs
botnets
malwares
gray-hacker-resources
-
Updated
May 19, 2020 - C
Awesome hacking is an awesome collection of hacking tools.
-
Updated
Jul 16, 2020 - Python
TCP/IP packet demultiplexer. Download from:
-
Updated
Jul 6, 2020 - C++
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
-
Updated
Jul 17, 2020 - Java
python
network-diagram
security
pcap
packets
network
tor
traffic
forensics
cybersecurity
computer-forensics
forensic-analysis
tor-traffic
-
Updated
Aug 22, 2019 - Python
Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux
-
Updated
Jun 29, 2020 - Python
Web browser forensics for Google Chrome/Chromium
-
Updated
Jun 10, 2020 - Python
Educational, CTF-styled labs for individuals interested in Memory Forensics
-
Updated
Jul 7, 2020
operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
go
golang
enterprise
scraper
framework
osint
phone
linkedin
fingerprint
forensics
whatsapp
whatsapp-web
geoint
gathering
investigation
whatsapp-api
societe
-
Updated
Jul 14, 2020 - Go
Automation and Scaling of Digital Forensics Tools
-
Updated
Jul 14, 2020 - Python
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
-
Updated
Dec 31, 2019
A Linux packet crafting tool.
networking
hacking
forensics
denial-of-service
network-security-monitoring
arp-spoofing
intrusion-prevention
network-analysis
network-test
network-protocols
packet-crafting
hacking-tool
-
Updated
Mar 31, 2017 - C
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
-
Updated
Jul 13, 2018 - Shell
-
Updated
Jul 23, 2018 - C++
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
-
Updated
Jun 6, 2019 - Batchfile
Improve this page
Add a description, image, and links to the forensics topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the forensics topic, visit your repo's landing page and select "manage topics."
R_API r_anal_esil_*intolibr/include/r_esil.h