Phone: A Mobile Phone Forensic Framework ( Android )
☆210Mar 22, 2025Updated 11 months ago
Alternatives and similar repositories for Phone
Users that are interested in Phone are comparing it to the libraries listed below
Sorting:
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆131May 12, 2025Updated 9 months ago
- Steganography Detection Framework☆13Jan 8, 2025Updated last year
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆13Oct 6, 2025Updated 4 months ago
- ☆76Jan 27, 2025Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- CVE-2025-1974☆90Apr 2, 2025Updated 11 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- Social Media Search Tool☆15Aug 25, 2024Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- A list of all Active Directory machines from HackTheBox☆217Jan 25, 2026Updated last month
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 3 months ago
- External recon toolkit☆55Dec 29, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Aug 31, 2025Updated 6 months ago
- ☆41Feb 20, 2025Updated last year
- OSINT Tool for research social media accounts by username☆71Dec 29, 2024Updated last year
- Embed a payload inside a PNG file☆370Oct 24, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆84Oct 16, 2025Updated 4 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated 11 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆571May 22, 2025Updated 9 months ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆234Apr 5, 2025Updated 10 months ago
- Security reconnaissance and assessment tool for identifying potentially exposed IP cameras by analyzing open ports, service configuration…☆780Jan 6, 2026Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆88Jan 25, 2026Updated last month
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- map and spoof remoteid coordinates☆12Feb 15, 2026Updated 2 weeks ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆405Dec 20, 2025Updated 2 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆35Jun 23, 2025Updated 8 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated last month
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆162Jun 19, 2025Updated 8 months ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆184Mar 14, 2025Updated 11 months ago
- ☆772May 7, 2025Updated 9 months ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆331Updated this week
- AntiHunter Perimeter Defense Systems☆103Updated this week
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago