A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite…
Collection of Jupyter Notebooks by @fr0gger_
A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodol…
A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.
Distributed malware processing framework based on Python, Redis and S3.
A cybersecurity game in Azure Data Explorer
Kernel-Enforced Install-Time Policies (KEIP): An eBPF/LSM based security tool that detects and blocks malicious network activity during pip …
Headless AI agent for deterministic reverse engineering.
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, …
Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.
eBPF-powered network observability for Kubernetes. Indexes L4/L7 traffic with full K8s context, decrypts TLS without keys. Queryable by AI a…
Digital Forensics Investigation Platform
intel x86(-64) code analysis library that reconstructs control flow
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be co…
A lightweight security threat scanner intended to make malware detection more accessible and efficient.
A command-line interface for LevelDB
Dumps all of the Key/Value pairs from a LevelDB database
A Python library to debug binary executables, your own way.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
Incident Response collection and processing scripts with automated reporting scripts
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integra…
Cross-platform incident response and live forensics toolkit with built-in detection, structured analysis, and report generation — designed f…
Hyper-V Research is trendy now
LockKnife: The Ultimate Android Security Research Tool. A unified TUI workspace and headless CLI for deep Android security research, built f…