Provides various Windows Server Active Directory (AD) security-focused reports.
Active Directory Forensic Toolkit : Detect & reconstruct AD attacks from Windows event logs (EVTX)
Timeline of Active Directory changes with replication metadata
Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebooks…
Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, and…
IDApython Scripts for Analyzing Golang Binaries
Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.
Strumenti di Acquisizione e Analisi di copie Forensi
analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multiple …
androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of…
androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of…
754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF · …
Static and dynamic Android application security analysis
On demand query API for https://github.com/davidonzo/Threat-Intel project.
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Android Reverse-Engineering Workbench for VS Code
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea…
Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.
Local-first AI-powered document intelligence platform for investigative journalism
A cross platform forensic parser written in Rust!
🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, comp…
A library for creating, reading and editing PE files and .NET modules.
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Netwo…