Educational, CTF-styled labs for individuals interested in Memory Forensics
-
Updated
Mar 8, 2021 - Shell
Educational, CTF-styled labs for individuals interested in Memory Forensics
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Everything related to Linux Forensics
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Awesome collection of resources 😎 Work in progress🔥
Digital Forensics and Incident Response (DFIR)
This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.
The entire walkthrough of all my resolved TryHackMe rooms
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Writeups for all the HTB machines I have done
Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pen drives and photo cameras.
Tool to sort large collections of files according to common typologies
Alcide Kubernetes Audit Log Analyzer - Alcide kAudit
unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
The source files of my completed TryHackMe challenges and walkthroughs with links to their respective rooms
LIFARS Networking Security GNU/Linux distro
log Forenix 🕵️- Your Linux Forensic Artifacts Collector Tool! 🚀
Simple volatility profile builder based on Docker container
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
Add a description, image, and links to the forensics topic page so that developers can more easily learn about it.
To associate your repository with the forensics topic, visit your repo's landing page and select "manage topics."