7h3pr0xy / Anti-ForensicsLinks
☆20Updated 7 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆23Updated 6 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated 2 years ago
- ☆17Updated 8 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- WiFi arsenal☆17Updated 5 years ago
- Clear diverses Logs and History Files saved by Windows.☆24Updated 8 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 3 years ago
- A Hacking and Pentesting Tool for Windows☆19Updated 5 months ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Updated 5 years ago
- ☆33Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆39Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- A powerful reverse shell generator☆45Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Memory Scaner☆64Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆130Updated 2 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆108Updated 5 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 4 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- ☆18Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 3 years ago
- ☆56Updated 2 years ago
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆123Updated 2 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago