PRINT
PRINT
SEND MAIL
SEND MAIL

FAMA – Forensic Analysis For Mobile Apps

LabCIF - Forensic Analysis for Mobile Apps Getting Started Android extraction and analysis framework with an integrated Autopsy Module. Dump easily user data from a device and generate powerful reports for Autopsy or external applications.Functionali...

Continue reading

PhishingKitTracker – Let’s Track Phishing Kits To Give To Research Community Raw Material To Stud

An extensible and freshly updated collection of phishingkits for forensics and future analysis topped with simple statsDisclaimerThis repository holds a collection of Phishing Kits used by criminals to steal user information. Almost every file into the...

Continue reading

RedHunt OS v2 – Virtual Machine For Adversary Emulation And Threat Hunting

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt LabsRedHunt OS aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify ...

Continue reading

Skadi – Collect, Process, And Hunt With Host Based Data From MacOS, Windows, And Linux

(pronounced “SKAH-Dee”: similar to Scotty but with a d sound) is a giantess and goddess of hunting in Norse mythologyPurposeSkadi is a free, open source collection of tools that enables the collection, processing and advanced analysis of forensic artif...

Continue reading

Usbrip – Simple Command Line Forensics Tool For Tracking USB Device Artifacts (History Of USB Events) On GNU/Linux

usbrip (derived from "USB Ripper", not "USB R.I.P.") is an open source forensics tool with CLI interface that lets you keep track of USB device artifacts (aka USB event history, "Connected" and "Disconnected" events) on Linux machines.Descriptionusbrip...

Continue reading

RedGhost v3.0 – Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace

Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.PayloadsFunction to generate various encoded reverse shells in netcat, bash, python, php, ruby, perlSudoInjectFunc...

Continue reading

OSXCollector – A Forensic Evidence Collection & Analysis Toolkit For OS X

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.Forensic CollectionThe collection script runs on a potentially infected machine and outputs a JSON file that describes the target machine. OSXCollector gathers information fr...

Continue reading

RedGhost v2.0 – Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance And Leaving No Trace

Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.PayloadsFunction to generate various encoded reverse shells in netcat, bash, python, php, ruby, perlSudoInjectFunc...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account