Phone: A Mobile Phone Forensic Framework ( Android )
☆210Mar 22, 2025Updated last year
Alternatives and similar repositories for Phone
Users that are interested in Phone are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steganography Detection Framework☆13Jan 8, 2025Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆132May 12, 2025Updated 10 months ago
- ☆76Jan 27, 2025Updated last year
- CVE-2025-1974☆90Apr 2, 2025Updated 11 months ago
- Social Media Search Tool☆15Aug 25, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- JB For Device Checkm8☆11Sep 1, 2023Updated 2 years ago
- External recon toolkit☆56Dec 29, 2024Updated last year
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆91Jan 25, 2026Updated 2 months ago
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆13Oct 6, 2025Updated 5 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 4 months ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆233Apr 5, 2025Updated 11 months ago
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- OSINT Tool for research social media accounts by username☆71Dec 29, 2024Updated last year
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Aug 31, 2025Updated 6 months ago
- Simply carrying your cell/modile phone can be enough to locate you. Greatly inspired byt the New York Times Article Twelve Million Phones…☆24Jan 7, 2023Updated 3 years ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆571May 22, 2025Updated 10 months ago
- A simple tweak to add power settings to the Settings app.☆14Mar 2, 2025Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- A tool for mapping cyber crime☆236Jan 24, 2026Updated 2 months ago
- Security reconnaissance and assessment tool for identifying potentially exposed IP cameras by analyzing open ports, service configuration…☆801Jan 6, 2026Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 3 weeks ago
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year
- A real fake social engineering app☆131Jul 13, 2025Updated 8 months ago
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆84Oct 16, 2025Updated 5 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆59Jan 25, 2026Updated 2 months ago
- ☆197Apr 23, 2025Updated 11 months ago
- Automating the MITM attack on WSUS☆315Updated this week
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Embed a payload inside a PNG file☆371Oct 24, 2024Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!☆333Updated this week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆476Oct 29, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS…☆572Mar 17, 2026Updated last week
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆816Mar 28, 2025Updated 11 months ago