Pinned Repositories
acs-keyvault-agent
A Azure Key Vault agent container that grabs secrets from Azure Key Vault securely and passes them to other containers in its pod
Forensics
Contains different scripts and tools referenced in Hexadite blog posts
gcs-oauth2-boto-plugin-hexadite
Auth plugin allowing use the use of OAuth 2.0 credentials for Google Cloud Storage in the Boto library.
impacket-1
Impacket is a collection of Python classes for working with network protocols.
korg
assembling regular expressions from reusable patterns (a Python logstash grok clone)
pycrypto
The Python Cryptography Toolkit
pymssql
Official home for the pymssql source code.
pypicloud-hexadite
Cloud storage backed pypi server implementation
txwinrm
Asynchronous Python WinRM client
volatility
An advanced memory forensics framework
Hexadite's Repositories
Hexadite/acs-keyvault-agent
A Azure Key Vault agent container that grabs secrets from Azure Key Vault securely and passes them to other containers in its pod
Hexadite/pypicloud-hexadite
Cloud storage backed pypi server implementation
Hexadite/korg
assembling regular expressions from reusable patterns (a Python logstash grok clone)
Hexadite/Forensics
Contains different scripts and tools referenced in Hexadite blog posts
Hexadite/gcs-oauth2-boto-plugin-hexadite
Auth plugin allowing use the use of OAuth 2.0 credentials for Google Cloud Storage in the Boto library.
Hexadite/impacket-1
Impacket is a collection of Python classes for working with network protocols.
Hexadite/pycrypto
The Python Cryptography Toolkit
Hexadite/pymssql
Official home for the pymssql source code.
Hexadite/txwinrm
Asynchronous Python WinRM client
Hexadite/volatility
An advanced memory forensics framework
Hexadite/distorm
Powerful Disassembler Library For x86/AMD64
Hexadite/pykerberos
Pykerberos module for use with zenoss Windows Zenpack
Hexadite/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.