7h3pr0xy / Anti-ForensicsLinks
☆20Updated 7 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆22Updated 6 years ago
- ☆17Updated 8 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Updated 5 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- Clear diverses Logs and History Files saved by Windows.☆25Updated 8 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Forensic Imaging quickstarts!☆14Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- Notes and IoCs of fresh malware☆59Updated last year
- A Hacking and Pentesting Tool for Windows☆19Updated 4 months ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 4 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated last year
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Cobalt Strike 4.4 Full cracked☆20Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Custom pentesting tools☆25Updated 5 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆33Updated last year
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- Memory Scaner☆63Updated 3 years ago
- ☆56Updated 2 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆130Updated 2 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 3 years ago
- A Firefox add-on for OSINT investigations☆131Updated last week
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated last month