Advanced Search
Search Results
178 total results found
Scripts
Binary Parser
import struct import socket import datetime from collections import defaultdict, Counter def parse_binary_logs(file_path): """Parse binary log file according to the specified format.""" login_attempts = [] with open(file_path, 'rb') as f: ...
Compromised User Detector
import struct import socket import datetime from collections import defaultdict, Counter def parse_binary_logs(file_path): """Parse binary log file according to the specified format.""" login_attempts = [] with open(file_path, 'rb') as f: ...
GPG Verify
#!/bin/bash echo "Verifying signature files in the current directory..." for sig_file in *.sig; do if [[ -f "$sig_file" ]]; then original_file="${sig_file%.sig}" echo "" echo "Verifying signature for \"$original_file\" using \"$sig_file\"..." ...
Hash Identifier
#!/usr/bin/env python3 import re import sys import hashlib from collections import defaultdict def identify_hash(hash_string): """Identify the type of hash based on pattern, length, and character set.""" # Clean the hash string hash_string =...
HMAC
#!/usr/bin/env python3 """ Simple HMAC Verification Script This script verifies HMAC signatures for message files by: 1. Finding all message_#.txt and message_#.hmac file pairs 2. Checking each line to verify the HMAC integrity 3. Reporting only basic verific...
HMAC Integrity Checker
#!/usr/bin/env python3 """ DNS Subdomain Batch Integrity Checker This script processes multiple message/HMAC file pairs in a directory, following the pattern: message_#.txt and message_#.hmac It automatically detects and verifies all matching pairs in the sp...
Liber8tion Cracker
#!/usr/bin/env python3 import os import argparse import subprocess import sys import tempfile import shutil def run_hashcat(cmd, description): """Run a hashcat command with proper logging""" print(f"[+] {description}") print(f"[+] Command: {' '.j...
PDF to Hashcat
#!/usr/bin/env python # Copyright (c) 2013 Shane Quigley, < shane at softwareontheside.info > # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in ...
PDF to John
#!/usr/bin/env python3 # This software is Copyright (c) 2023 Benjamin Dornel <[email protected]> # and it is hereby released to the general public under the following terms: # Redistribution and use in source and binary forms, with or without # modific...
Steg
#!/usr/bin/env python3 """ Steganography Extraction Tool This script extracts hidden data from images using various steganography techniques. Usage: python steg_extract.py <image_file> """ import sys import os import numpy as np from PIL import Image import ...
Binary Log Parser and Anomaly Detector
#!/usr/bin/env python3 """ Binary Log Parser and Anomaly Detector This script parses a custom binary format for login attempt logs and identifies potentially compromised accounts based on anomalous behavior. Format: - username_length: 4-byte integer (big-en...
Forensic Report
This book presents a complete Digital Forensics Examination Report documenting the investigation into a criminal case involving the illegal trade of owls (Subject: Sarah McAvoy). Authored by a Digital Forensic Examiner, this report serves as a detailed case st...
Forensic Report
Investigator Information David RizzoB.S. Cyber SecurityWilmington University, New Castle, DelawareDigital Forensic Examiner Case Details Subject: Digital Forensics Examination ReportOffence: Illegal purchase, sale, or trade of owlsAccused: Sarah McAvoyD...
ELK Stack
Elastic Stack Deployment
The files in this repository were used to configure the network depicted below. These files have been tested and used to generate a live ELK deployment on Azure. They can be used to either recreate the entire deployment pictured above. Alternatively, select...
YAML
FileBeat Config
######################## Filebeat Configuration ############################ # This file is a full configuration example documenting all non-deprecated # options in comments. For a shorter configuration example, that contains only # the most common options, pl...