An anti-forensic multitool written in bash
Support
Quality
Security
License
Reuse
A Forensics Mini Project - File Recovery Tool that extracts Images and PDF from the memory dump image
Support
Quality
Security
License
Reuse
Ansible role to setup TimeSketch and Plaso for Disk images Forensics Timeline
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
DLL pack
Support
Quality
Security
License
Reuse
cyber cug control
Support
Quality
Security
License
Reuse
r
robust-classes-solutionsby UBCx-Software-Construction-2
Java 2 Version:Current License: No License (No License)
This repository contains solutions for Robust Classes in UBCx SoftConst2x: Object Oriented Design
Support
Quality
Security
License
Reuse
Lethean Attack - adversarial method which induces complete forgetfulness on a test-time training model
Support
Quality
Security
License
Reuse
POC in order to materialize prevention concepts described in the following OWASP WebSocket cheatsheet
Support
Quality
Security
License
Reuse
A Windows .DLL injector written in Python
Support
Quality
Security
License
Reuse
Cloud Automated Forensics & Incident Response
Support
Quality
Security
License
Reuse
A simple DLL injector written in C# that injects a DLL into a running process
Support
Quality
Security
License
Reuse
Ukki - dead bird. It is only for investigation, learning purpose, dear engineers.
Support
Quality
Security
License
Reuse
Received dump1090-fa output as log.csv and creates static Google Earth KML files for each contact.
Support
Quality
Security
License
Reuse
P
Python-Mapping-Injectionby Starwarsfan2099
Python 2 Version:Current License: No License (No License)
Python implementation of the Mapping-Injection technique for injecting shellcode into a process.
Support
Quality
Security
License
Reuse
Web GUI for Triage-IR forensic program
Support
Quality
Security
License
Reuse
misc misc misc
Support
Quality
Security
License
Reuse
K
KNN-Identification-codesby yhswjtuILMARE
Python 2 Version:Current License: Strong Copyleft (GPL-3.0)
The algorithm can be used to identify the verification code
Support
Quality
Security
License
Reuse
This repository holds the code and documentation for our Windows Forensic Suite
Support
Quality
Security
License
Reuse
N00b trial to manipulate windows processes to Read Memory Address, Perform DLL injection, Inject Shellcode using C#
Support
Quality
Security
License
Reuse
Information gathering script that extracts metadata from microsoft 0LE2 files,detects Macros/VBA in the files,calculates checksums and forwards them to virus total for malware analysis
Support
Quality
Security
License
Reuse
Python tool to detect https malware traffic
Support
Quality
Security
License
Reuse
Forensic analysis tool for Facebook Messenger (Beta) on Windows 10
Support
Quality
Security
License
Reuse
Proposed defenses against several adversarial attacks for speech to text systems
Support
Quality
Security
License
Reuse
DLL Injector
Support
Quality
Security
License
Reuse
Demonstrates and explains the OWASP Top 10 threats in terms of .Net C#
Support
Quality
Security
License
Reuse
Injection of codes @ViolentPython @GrayHatPython
Support
Quality
Security
License
Reuse
Use several models to train Imagenet
Support
Quality
Security
License
Reuse
Analyzing cyber attacks data so that we can predict any future cyber attack just from data arrived such as protocols used, duration of connection, and other features.
Support
Quality
Security
License
Reuse
PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM
Support
Quality
Security
License
Reuse
This is a simple Python implementation of the Brainf*ck Esolang.
Support
Quality
Security
License
Reuse
A simply but effective keylogger coded in Python!
Support
Quality
Security
License
Reuse
A forensic tool to analyze Ceph BlueStore OSDs
Support
Quality
Security
License
Reuse
The Auditree evidence removal tool.
Support
Quality
Security
License
Reuse
Combine the source forensic and the adversarial attack. Give a resonable attack and defensive method for this case.
Support
Quality
Security
License
Reuse
Learning about Ethical Hacking using Python :squirrel: :snake:
Support
Quality
Security
License
Reuse
D
DiskImager-A-Memory-Forensic-Tool-v1by ZuberVhora
Python 2 Version:Current License: No License (No License)
A GUI based forensic tool to create bit by bit copy of disk like Pendrive & Hard Disk.
Support
Quality
Security
License
Reuse
extractor for QNX6 filesystem format.
Support
Quality
Security
License
Reuse
k
kdd_cup_2020_attacks_defense_graphsby chaupmcs
Python 2 Version:Current License: No License (No License)
Adversarial Attacks and Defense on Academic Graph
Support
Quality
Security
License
Reuse
Spawn a reverse TCP shell in the context of another Linux process
Support
Quality
Security
License
Reuse
active directory forensics tool aimed at searching for the difference between snapshots of your domain
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
Open Source Cyber Threat Intelligence Feed Collector
Support
Quality
Security
License
Reuse
Domain-adversarial Network Alignment
Support
Quality
Security
License
Reuse
Keylogger in Python
Support
Quality
Security
License
Reuse
POC in order to materialize prevention concepts described in the following OWASP cheatsheet
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
CybeR || GTFO
Support
Quality
Security
License
Reuse
Code for experiments in SAGE paper (NeurIPS 2020)
Support
Quality
Security
License
Reuse
Extract only relevant history from git repo
Support
Quality
Security
License
Reuse
A
AntiForby cys3c
An anti-forensic multitool written in bash
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
F
FileRecoveryToolby Srinivas11789
A Forensics Mini Project - File Recovery Tool that extracts Images and PDF from the memory dump image
Python 2Updated: 4 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
a
ansible-timesketchby juju4
Ansible role to setup TimeSketch and Plaso for Disk images Forensics Timeline
HTML 2Updated: 3 y ago License: Permissive (BSD-2-Clause)
Support
Quality
Security
License
Reuse
a
adversarial-projectby srakrn
Python 2Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
T
Support
Quality
Security
License
Reuse
d
db-fallblattanzeige-webby c-base
cyber cug control
JavaScript 2Updated: 5 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
r
robust-classes-solutionsby UBCx-Software-Construction-2
This repository contains solutions for Robust Classes in UBCx SoftConst2x: Object Oriented Design
Java 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
l
letheanby eyalperry88
Lethean Attack - adversarial method which induces complete forgetfulness on a test-time training model
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
p
poc-websocketby righettod
POC in order to materialize prevention concepts described in the following OWASP WebSocket cheatsheet
Java 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
P
PY-MEMJECTby killvxk
A Windows .DLL injector written in Python
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
CAFIRby ArborBytes
Cloud Automated Forensics & Incident Response
Python 2Updated: 4 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
S
Simple-Injectorby pessimo
A simple DLL injector written in C# that injects a DLL into a running process
C# 2Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
u
ukkiby JasurbekNURBOYEV
Ukki - dead bird. It is only for investigation, learning purpose, dear engineers.
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
d
dump1090toKMLby me2youall
Received dump1090-fa output as log.csv and creates static Google Earth KML files for each contact.
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
P
Python-Mapping-Injectionby Starwarsfan2099
Python implementation of the Mapping-Injection technique for injecting shellcode into a process.
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
T
TriageIR-Mapby efstratios
Web GUI for Triage-IR forensic program
JavaScript 2Updated: 3 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
g
Support
Quality
Security
License
Reuse
K
KNN-Identification-codesby yhswjtuILMARE
The algorithm can be used to identify the verification code
Python 2Updated: 5 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
C
Capstone_Projectby DKlein91
This repository holds the code and documentation for our Windows Forensic Suite
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
W
WindowsProcessManipulatorby 0xfouda
N00b trial to manipulate windows processes to Read Memory Address, Perform DLL injection, Inject Shellcode using C#
C# 2Updated: 5 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
O
OLE_META_MACROSby AustinWafula
Information gathering script that extracts metadata from microsoft 0LE2 files,detects Macros/VBA in the files,calculates checksums and forwards them to virus total for malware analysis
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
H
HTTPSDetectorToolby frenky-strasak
Python tool to detect https malware traffic
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
w
w10-facemessengerby ricardoapl
Forensic analysis tool for Facebook Messenger (Beta) on Windows 10
Python 2Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
a
audio_defenseby iamgroot42
Proposed defenses against several adversarial attacks for speech to text systems
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
t
Support
Quality
Security
License
Reuse
O
OwaspTop10DotNetby shaneinsweden
Demonstrates and explains the OWASP Top 10 threats in terms of .Net C#
C# 2Updated: 3 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
m
memoryinjectby AdrielFreud
Injection of codes @ViolentPython @GrayHatPython
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
I
Imagenet_trainingby 5663015
Use several models to train Imagenet
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
CyberSecurity_Data_Analysisby mazenhk
Analyzing cyber attacks data so that we can predict any future cyber attack just from data arrived such as protocols used, duration of connection, and other features.
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
e
ebm-defenseby point0bar1
PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM
Python 2Updated: 3 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
B
Brainf-ckby pointerish
This is a simple Python implementation of the Brainf*ck Esolang.
Python 2Updated: 3 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
d
deltaloggerby Alphvino
A simply but effective keylogger coded in Python!
Python 2Updated: 3 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
v
vampyrby fbausch
A forensic tool to analyze Ceph BlueStore OSDs
Python 2Updated: 5 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
a
auditree-pruneby ComplianceAsCode
The Auditree evidence removal tool.
Python 2Updated: 4 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
S
Source-attackby Dlut-lab-zmn
Combine the source forensic and the adversarial attack. Give a resonable attack and defensive method for this case.
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
E
EthicalHacking-Pythonby GambuzX
Learning about Ethical Hacking using Python :squirrel: :snake:
Python 2Updated: 5 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
D
DiskImager-A-Memory-Forensic-Tool-v1by ZuberVhora
A GUI based forensic tool to create bit by bit copy of disk like Pendrive & Hard Disk.
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
q
qnx6-extractorby ReFirmLabs
extractor for QNX6 filesystem format.
Python 2Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
k
kdd_cup_2020_attacks_defense_graphsby chaupmcs
Adversarial Attacks and Defense on Academic Graph
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
s
shellinjectby DavidBuchanan314
Spawn a reverse TCP shell in the context of another Linux process
Python 2Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
p
pugby jonisakov
active directory forensics tool aimed at searching for the difference between snapshots of your domain
Python 2Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
P
ProgrammingTrainingby JakePeralta7
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
CTI-Feed-Collectorby kdrypr
Open Source Cyber Threat Intelligence Feed Collector
Python 2Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
D
DANAby xhhszc
Domain-adversarial Network Alignment
Python 2Updated: 4 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
K
Support
Quality
Security
License
Reuse
p
poc-argon2-phpby righettod
POC in order to materialize prevention concepts described in the following OWASP cheatsheet
PHP 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
n
neurips20_publicby yk
Python 2Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
c
Support
Quality
Security
License
Reuse
s
sage-experimentsby iancovert
Code for experiments in SAGE paper (NeurIPS 2020)
Python 2Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
g
git-relevant-historyby rainlabs-eu
Extract only relevant history from git repo
Python 2Updated: 3 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse