Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for shell forensics
forensics
x
shell
x
46 search results found
Memlabs
⭐
689
Educational, CTF-styled labs for individuals interested in Memory Forensics
Linuxforensics
⭐
611
Everything related to Linux Forensics
Uac
⭐
550
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Bitscout
⭐
423
Remote forensics meta tool
Snaprecovery
⭐
400
Recover old Snaps that have “disappeared” from Snapchat
Swap_digger
⭐
376
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Allthingstimesketch
⭐
69
This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.
My Forensics
⭐
68
Digital Forensics and Incident Response (DFIR)
Sandfly Setup
⭐
57
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Tryhackme Write Up
⭐
56
The entire walkthrough of all my resolved TryHackMe rooms
Hackthebox Writeups
⭐
50
Writeups for all the HTB machines I have done
Osdfir Infrastructure
⭐
35
Helm charts for running open source digital forensic tools in Kubernetes
Harvest
⭐
31
Tool to sort large collections of files according to common typologies
Foroboto
⭐
27
ADB Based Acquisition Tool for Android Forensics
Kaudit
⭐
25
Alcide Kubernetes Audit Log Analyzer - Alcide kAudit
Anti Forensics
⭐
25
A collection of anti-forensics scripts
Nefias
⭐
24
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Jumplist Browser
⭐
23
Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser
Drivebadger
⭐
21
Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pen drives and photo cameras.
Bitscout
⭐
19
Panoptis2016
⭐
18
Τεκμηρίωση για τα επεισόδια της Άσκησης Κυβερνοάμυνας Πανόπτης 2016
Warnings Ng Plugin Devenv
⭐
18
Development environment for Jenkins' Warnings Next Generation Plugin
Hashes Harvester
⭐
17
Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.
Tracespipe
⭐
16
Reconstruction and analysis of viral and host genomes at multi-organ level
Mantos
⭐
16
LIFARS Networking Security GNU/Linux distro
Unix_collector
⭐
15
A live forensic collection script for UNIX-like systems.
Mini Kali
⭐
15
Docker image for hacking
Tryhackme
⭐
13
The source files of my completed TryHackMe challenges and walkthroughs with links to their respective rooms
Forensics
⭐
12
shell script to create an image and perform initial examination on a drive
Gensum
⭐
12
Powerful checksum generator!
Maas
⭐
12
Scalable Cluster Administration Bash framework
Docker Cif
⭐
11
CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)
Forensic Imaging Quickstarts
⭐
10
Forensic Imaging quickstarts!
T.u.f.f.
⭐
10
T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesting solution. The script is based on Kali Linux tools already pre-installed.
Prepkal
⭐
9
Simple script to download some missing tools in Kali
Sysscout
⭐
9
SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy to use Incident Response and Network Forensics tool that doesn't require installation of dependencies and/or additional toolkits.
Android Tools
⭐
9
Tools to help with Android assessments and forensics
Wot
⭐
8
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
Hackini 2k22
⭐
7
Write-ups of the challenges I solved in the HackINI-2k22 ctf challenge
Malware Tools Docker
⭐
6
Dockerfile with tools for analyzing malicious documents.
Rds4xways
⭐
6
Extract SHA1 from Reference Data Set (RDS) provided by the National Software Reference Library (NSRL) for X-Ways Forensics (or any other tool that uses SHA1).
Andump
⭐
6
For Android Data Forensic
Raw2fs
⭐
5
Bash script for computer forensics - It's possible to resolve the file name starting from the carved file name generated by the Foremost tool and save it, it generates an HTML report. It's possible to resolve the file name starting from the offset of a "grep" keywords search. The tool identifies automatically the change of the partition and, if the keyword is contained into the slack space, saves the sector/cluster/block where it is. (remember that for fat -> sector, ntfs -> cluster, ext2/3 -> b
Icas
⭐
5
Shared resources intended for use by DARPA ICAS
Myool
⭐
5
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
Ansible Live Response
⭐
5
This is an example of using Ansible for live response forensics as presented at the SANS DFIR Summit 2019.
Booty
⭐
5
Minimal forensic/exfiltration/evil-maid/rescue live boot system
Myportage
⭐
5
My personal Gentoo portage
Related Searches
Shell Docker (20,660)
Shell Script (15,351)
Shell Bash (10,338)
Shell Command Line (6,542)
Shell Dotfiles (5,338)
Shell Git (4,715)
Shell Ansible (4,427)
Shell Server (3,563)
Shell Ssh (3,562)
Shell Docker Image (3,406)
1-46 of 46 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.