Single PHP file to detect potentially malicious threats based on token and hash with web interface
-
Updated
May 24, 2024 - PHP
Single PHP file to detect potentially malicious threats based on token and hash with web interface
Odinova is an Open Source Intelligence (OSINT) tool equipped with a user-friendly graphical interface, designed for efficient information gathering about a target. With features like web and user searches, Serpapi integration, system information retrieval, forum detection, and social profile recognition, Scavenger excels in digital reconnaissance
Volatility3 Linux profiles
Examine, create and interact with remote objects in other .NET processes.
Programs and or walkthroughs relating to PicoCTF (https://picoctf.org/)
This repo contains some hacks and important cli commands which I often need but forget the exact params etc. So its kind of a look up file which saves me time 😁
Process-aware, eBPF-based tcpdump
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
UNIX-like reverse engineering framework and command-line toolset
Web | Mobile | API | Thick Client | Source Code Review | Wireless | Network Pentesting etc...
Free hands-on digital forensics labs for students and faculty
TryHackMe Learning from Scratch .. towards CBBH & CDSA
A powerful tool designed to harvest and collect a wide range of windows system data for forensics.
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
This script analyzes MZ-PE (MS-DOS) executable file
Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Add a description, image, and links to the forensics topic page so that developers can more easily learn about it.
To associate your repository with the forensics topic, visit your repo's landing page and select "manage topics."