043a7e / airdropmsisdnView external linksLinks
Attempts to reverse a given partial hash to a phone number (or email) given the area code. Written for python3.
☆20Oct 25, 2022Updated 3 years ago
Alternatives and similar repositories for airdropmsisdn
Users that are interested in airdropmsisdn are comparing it to the libraries listed below
Sorting:
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Updated this week
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Apr 10, 2024Updated last year
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- A small collection of OSINT data collection tools.☆17Jun 14, 2019Updated 6 years ago
- A series of python scripts to extract information from SQLite Data Files☆21Nov 15, 2025Updated 3 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 3 months ago
- ☆24Oct 30, 2024Updated last year
- An open source project aimed to replicate the Windows SIFT Machine and tools used during SANS Courses minus any payware software.☆25Oct 18, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Parser fo macOS/iOS FSEvents Logs☆43May 6, 2024Updated last year
- Volatility Plugins☆64Jul 22, 2023Updated 2 years ago
- Signature scanner and maker plugin for Binary Ninja☆31Aug 12, 2024Updated last year
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- Implemented a data structure that will help solve a simplified version of the mobile phone tracking problem, i.e., the fundamental proble…☆11Oct 18, 2018Updated 7 years ago
- Offensive go lang series☆35May 2, 2020Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- BlurSPY app is a very useful cell phone tracking application, which features a number of useful functions. If it is installed on the targ…☆11Dec 16, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- L.I.A.M is an open source case management system for digital forensics labs. Law-Enforcement Investigations and Asset Management☆12Jul 4, 2025Updated 7 months ago
- 一个用于暴力破解猫变换(Arnold's Cat Map)加密图像的命令行工具。☆26Dec 21, 2025Updated last month
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆16Jul 30, 2022Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- 要是不做开源的话,我可能早就财务自由了吧?😅☆18Dec 20, 2021Updated 4 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- mift - a mobile image forensic toolkit☆46Nov 14, 2023Updated 2 years ago
- A cross platform parser for Apple UnifiedLogs!☆323Feb 1, 2026Updated 2 weeks ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- AGL Documentation - Source for general documents, guides ...☆10Oct 22, 2020Updated 5 years ago
- TOTP for php (https://tools.ietf.org/html/rfc6238)☆12Jan 6, 2023Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- The ultimate streamline for Volatility 3. Speed up process of memory artifacts extraction phase☆14Dec 19, 2024Updated last year