OSXAuditor: free Mac OS X computer forensics tool
OS X Auditor OS X Auditor is a free Mac OS X computer forensics tool. OS X Auditor parses and hashes the following artifacts on the running system or a...
OS X Auditor OS X Auditor is a free Mac OS X computer forensics tool. OS X Auditor parses and hashes the following artifacts on the running system or a...
socksmon Monitor arbitrary TCP traffic using your HTTP interception proxy of choice What is socksmon? socksmon is a SOCKSv4 server based on Twisted, that tunnels incoming TCP traffic through an...
SSH Honeypot This program listens for incoming ssh connections and logs the ip address, username, and password used. This was written to gather rudimentary intelligence on brute force attacks. Installation...
SSMA SSMA is a simple malware analyzer written in Python 3. Features: Analyze PE file’s header and sections (number of sections, entropy of sections/PE file, suspicious section names, suspicious flags...
by do son · Published September 12, 2017 · Last modified November 4, 2024
WINspect is part of a larger project for auditing different areas of Windows environments. It focuses on enumerating different parts of a Windows machine to identify security weaknesses and point...
bulk_extractor is a program that extracts functions such as e-mail addresses, credit card numbers, URLs, and other types of information from digital evidence files. It is a useful forensic survey tool...
NorkNork – Tool for identifying Empire persistence payloads This script was designed to identify Powershell Empire persistence payloads on Windows systems. It currently supports checks for these persistence methods: Scheduled...
Forensics / Reverse Engineering / Smartphone PenTest
by do son · Published September 10, 2017 · Last modified October 10, 2021
MARA_Framework MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in...
Forensics / Network PenTest / Sniffing & Spoofing
by do son · Published September 10, 2017 · Last modified November 4, 2024
TCPDUMP can be the network to send the packet “header” completely intercepted to provide analysis. It supports filtering for network layers, protocols, hosts, networks, or ports, and provides logical statements...
CapTipper is a python tool to analyze, explore and revive HTTP malicious traffic. CapTipper sets up a web server that acts exactly as the server in the PCAP file, and...
Wetland Wetland is a high interaction SSH honeypot,designed to log brute force attacks.What’s more, wetland will log shell、scp、sftp、exec-command、direct-forward、reverse-forward interation performded by the attacker. Wetland is based on python ssh module paramiko....
by do son · Published August 30, 2017 · Last modified November 4, 2024
swap_digger swap_digger is a bash script used to automate Linux swap analysis for post-exploitation or forensic purpose. It automates swap extraction and searches for Linux user credentials, Web form credentials,...
Salamandra Spy Microphone Detection Tool Salamandra is a tool to detect and locate spy microphones in closed environments. It find microphones based on the strength of the signal sent by the microphone...
General Quincy is a memory forensic tool that detects Host-Based Code Injection Attacks (HBCIAs) in memory dumps. This is the prototpye implementation of Quincy referenced in the paper “Quincy: Detecting...
WMI_Forensics This repository contains scripts used to find evidence in WMI repositories, specifically OBJECTS.DATA files located at: C:\WINDOWS\system32\wbem\Repository\OBJECTS.DATA C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Download CCM_RUA_Finder.py CCM_RUA_finder.py extracts SCCM software metering RecentlyUsedApplication logs from OBJECTS.DATA...