Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)
Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deploy t…
Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reachabil…
Digital forensics platform and graphical interface to The Sleuth Kit. Features timeline analysis, keyword search, web artifact extraction, f…
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law…
Automagically extract forensic timeline from volatile memory dump
This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of runn…
📱 Avilla Forensics: A Global Revolution in Mobile Forensics Avilla Forensics is much more than a simple data extraction tool – it represents…
AVML - Acquire Volatile Memory for Linux
Awesome collection of resources 😎 Work in progress🔥
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programmin…
Welcome to "Awesome Incident Response," the ultimate open-source repository designed to simplify and guide you through the intricate world …
A curated list of awesome Android Reverse Engineering training, resources, and tools.
Curated collection of cybersecurity tools featured in Black Hat Arsenal events.
A curated list of tools officially presented at Black Hat events
Cloud-ops automation runbooks that are ready to use. Build your own automations using the hundreds of drag and drop actions included in the …
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Collection of Event ID ressources useful for Digital Forensics and Incident Response
A curated list of awesome resources related to executable packing
⭐️ A curated list of awesome forensic analysis tools and resources
Awesome hacking is an awesome collection of hacking tools.