7h3pr0xy / Anti-ForensicsLinks
☆17Updated 7 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆22Updated 6 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Clear diverses Logs and History Files saved by Windows.☆23Updated 8 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- ☆16Updated 8 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆15Updated 6 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Forensic Imaging quickstarts!☆13Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆39Updated 3 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- ☆54Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆41Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- You can delete all messages from the telegram chat by specifying its ID☆19Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- Custom pentesting tools☆26Updated 5 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- WiFi arsenal☆17Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- A powerful reverse shell generator☆46Updated 3 years ago
- ☆27Updated 3 years ago