MemLabs
LinuxForensics
Our great sponsors
MemLabs | LinuxForensics | |
---|---|---|
6 | 4 | |
1,520 | 660 | |
- | - | |
2.6 | 7.1 | |
about 3 years ago | 9 months ago | |
Shell | Shell | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MemLabs
LinuxForensics
We haven't tracked posts mentioning LinuxForensics yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
MemProcFS-Analyzer - MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
mal_unpack - Dynamic unpacker based on PE-sieve
Kuiper - Digital Forensics Investigation Platform
CaptfEncoder - Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
hayabusa - Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
my-arsenal-of-aws-security-tools - List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
robot_hacking_manual - Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
uac - UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
swap_digger - swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
bulk_extractor - This is the development tree. Production downloads are at:
ThreatHunting_with_Osquery - Threat Hunting & Incident Investigation with Osquery
gsvsoc_cirt-playbook-battle-cards - Cyber Incident Response Team Playbook Battle Cards