Console program to recover files based on their headers, footers, and internal data structures. Useful for recovering deleted images, PDFs, …
A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.
Forensics-Wiki是一个关于电子数据取证的维基百科,网址:https://www.forensics-wiki.com/ 。旨在为国内的取证从业者提供高质量的学习平台。
A list of free and open forensics analysis tools and other resources
Google Chrome forensic tool to process, analyze and visualize browsing artifacts
Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.
A curated list of tools for incident response. With repository stars⭐ and forks🍴
macOS forensic acquisition made simple
Livro: Engenharia Reversa - Fundamentos e Prática
the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file.…
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Detects process injection and memory manipulation used by malware. Finds RWX regions, shellcode patterns, API hooks, thread hijacking, and p…
I used examples from the books & materials
Original Repository of the GonnaCry Ransomware.
15-stage Windows malware development & analysis course in Rust. Red team builds it, blue team detects it. All 15 binaries achieved 0/76 on V…
Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all unobf…
Cyber Incident Response Team Playbook Battle Cards
g(ULP) core backend and plugins
GView is a cross-platform framework for reverse-engineering. Users can leverage the diverse range of available visualization options to effe…
A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and …
My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
Windows应急响应工具---Hawkeye(鹰眼)。集Windows日志分析,进程扫描,主机信息于一体的综合应急响应分析工具
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.