Lists (5)
Sort Name ascending (A-Z)
Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
Impacket is a collection of Python classes for working with network protocols.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
A cross-version Python bytecode decompiler
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Malware Configuration And Payload Extraction
CTF challenge (mostly pwn) files, scripts etc
Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall to dump in-memory PE files and reconstruct imports.
The ultimate AI-powered toolkit for python reverse engineering
DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.
Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍
A curated collection of DFIR skills and workflows for InfoSec practitioners.
Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.
Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect and divert the forensic analysis techniques. The plugin dete…
Attack & Defense CTF Farm based on DestructiveFarm
This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.
Compare efficiency of steganographic processes LSB,DCT and DWT
A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficients. This application was developed for a graduate-level unive…
A set of tools and resources for analysis of Havoc C2