☆17Feb 23, 2025Updated last year
Alternatives and similar repositories for MISC
Users that are interested in MISC are comparing it to the libraries listed below
Sorting:
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- ☆18Nov 8, 2025Updated 3 months ago
- Collection of CS2030 toy programs and PYPs - last updated 2 December 2025☆12Dec 30, 2025Updated 2 months ago
- Everything you see on my tutorials is here in this repo☆10Jun 19, 2017Updated 8 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 9 months ago
- A project managing Electronic Health Records(EHR) of patients and giving permissions to audity using Solidity(Etherium Blockchain) with T…☆11Aug 7, 2021Updated 4 years ago
- ☆13Sep 28, 2024Updated last year
- Just your regular Qur'an apps on Android platform, except I'm trying to make it's app size as small as possible while not sacrificing any…☆15Nov 13, 2025Updated 3 months ago
- ☆12Nov 13, 2023Updated 2 years ago
- Low-Code platform for developers☆12Sep 27, 2024Updated last year
- ☆11Oct 12, 2024Updated last year
- Some tools i made for personal use☆10Mar 15, 2024Updated last year
- ☆12Jun 1, 2024Updated last year
- ☆38Aug 27, 2021Updated 4 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 9 months ago
- My personal Blog☆10Nov 27, 2025Updated 3 months ago
- ☆11Jul 20, 2023Updated 2 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- ☆42May 20, 2021Updated 4 years ago
- A Blockchain Solution for EHR using Hyperledger Sawtooth☆10Jan 26, 2018Updated 8 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- ☆17Dec 18, 2025Updated 2 months ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- Electronic Health Records managing using hyperledger fabric composer☆13Jan 7, 2023Updated 3 years ago
- This is to edit a training forensic image file (raw/dd) and zero out all the unnecessary files.☆11Jun 21, 2025Updated 8 months ago
- ChainCare is a health information system that uses smart contracts to handle medical procedures and stores the medical history in Block C…☆13Mar 27, 2023Updated 2 years ago
- ☆12Mar 23, 2019Updated 6 years ago
- $MFT directory tree reconstruction & FILE record info☆326Oct 7, 2024Updated last year
- ☆12Apr 23, 2021Updated 4 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- my first ever operating system☆64Dec 10, 2025Updated 2 months ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago