☆17Feb 23, 2025Updated last year
Alternatives and similar repositories for MISC
Users that are interested in MISC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- Everything you see on my tutorials is here in this repo☆10Jun 19, 2017Updated 8 years ago
- ☆18May 1, 2026Updated 2 weeks ago
- ☆21Aug 26, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Forensic Imaging quickstarts!☆14Aug 12, 2022Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- $MFT directory tree reconstruction & FILE record info☆330Oct 7, 2024Updated last year
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated last year
- ☆15Jan 8, 2020Updated 6 years ago
- ☆11Oct 12, 2024Updated last year
- Contains compiled binaries of Volatility☆36May 18, 2025Updated last year
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆16Jul 19, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- 010 template for apfs☆27Feb 26, 2021Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- CTF writeups for the CTFs and Vulnerable Boxes I play with sometimes☆11Apr 20, 2017Updated 9 years ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆40Aug 27, 2021Updated 4 years ago
- ☆65Sep 18, 2025Updated 8 months ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- This is to edit a training forensic image file (raw/dd) and zero out all the unnecessary files.☆11Jun 21, 2025Updated 10 months ago
- A small tool to easily mount APFS image on macOS for forensics.☆17Jul 30, 2020Updated 5 years ago
- macOS Artifacts☆33Mar 2, 2025Updated last year
- Jsfuck decryption implemented by pure Python code☆16Jul 22, 2019Updated 6 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 7 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Collection of CS2030 toy programs and PYPs - last updated 28 April 2026☆15Apr 28, 2026Updated 3 weeks ago
- Hardening audit scripts validating Workstations and Servers based on CIS benchmarks☆16Aug 19, 2025Updated 9 months ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 4 months ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Industry leading face manipulation platform☆63Oct 24, 2025Updated 6 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆17Nov 2, 2022Updated 3 years ago