Penetrum LLC opensource security tool list.
- Updated
Mar 25, 2022
Penetrum LLC opensource security tool list.
Rapid Large-Scale Hunting and Collection for Enterprise AD Networks
反警方非法暴力取证的Win11安全加固策略 (Win11 Security Hardening Strategy Against Illegal Police Coercive Interrogation)
NovaTrace IR Kit is a lightweight, single-file PowerShell forensic evidence collection tool purpose-built for Windows incident response.
Prove your compliance posture with automated evidence and clear visualization. Open-source, OSCAL-native evidence collection from 30+ platforms with self-hosted/air-gapped deployment support.
This repository automates the collection and management of evidence from various tools and sources, committing the data for transparency and traceability. It's designed to gather evidence that tools like Vanta and others aren't built to collect.
Tamper-evident evidence collection pipeline with append-only SQLite storage, hash-chain integrity, and one-shot audit CLI execution.
Structured evidence ledger that turns pentest and DFIR artifacts into organized, timestamped case files.
ExamGurad is a portable Windows cyber-forensic tool that collects USB device history, event logs, and system activity evidence for academic integrity investigations.
Practical labs, case studies, and investigation notes for CHFI v11 — covering digital forensics, malware forensics, incident response, evidence collection, and analysis tools.
Open-source evidence collection engine for ISO 27001:2022 compliance. Connects to Microsoft 365 via Graph API, automatically collects audit evidence, evaluates compliance, and generates reports.
Automated forensics toolkit for verifying contest submissions with multi-source evidence collection (GitHub API, GH Archive, CT logs, urlscan, Wayback). Build tamper-proof timelines with deadline verification, dual-timezone display, and comprehensive audit trails. CLI-only, Docker-ready.
Linux Threat Hunting and Incident Response Toolkit with 8 forensic modules covering evidence collection, malware detection, persistence hunting, IOC extraction, webshell scanning, rootkit checks, and timeline reconstruction, supports chain of custody, implemented in pure Bash
Official evidence collection tool for unJaena AI forensic analysis platform — Cross-platform Digital Intelligence Collector (Windows/macOS/Linux/Android/iOS)
Run FTK Imager directly from a portable USB or WinFE environment to perform forensic imaging without installing software on the target system.
Add a description, image, and links to the evidence-collection topic page so that developers can more easily learn about it.
To associate your repository with the evidence-collection topic, visit your repo's landing page and select "manage topics."