Sid Mhatre's Projects
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card. Installers can be found at: http://www.sf.net/projects/autopsy/files/autopsy
Extracts images from doc/docx files.
A curated list of Awesome Threat Intelligence resources
Frontend for Tenacity + Archaius
Takes bunch of IP addresses, and resolves them. Also, does bunch of other things
Allows an application to delegate the capability to recover an account to an account controlled by the same user or entity at a third party service provider.
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
Simple Microsoft Windows sessions event logs visualization
Fast Incident Response
This is a test POC repo
A Python script to download all your mail from Gmail to your local hard drive.
Parses for Google Analytic values in raw files like RAM, DD images etc.
Simple Java image-scaling library implementing Chris Campbell's incremental scaling algorithm as well as Java2D's "best-practices" image-scaling techniques.
Social Networking Website | Messaging | Forums | Attendance Register | ETC
Incident Response Methodologies
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
A practical guide to securing macOS.
Extracts Exif, IPTC, XMP, ICC and other metadata from image, video and audio files
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Simple Python WSGI application to handle Github webhooks
Pure Java parser for Windows Registry hive files.
Registry viewer written in pure Java using Rejistry
Rekall Memory Forensic Framework
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.