A tool to perform automated forensic analysis of Chrome Browser.
☆33Feb 2, 2017Updated 9 years ago
Alternatives and similar repositories for ChromeForensics
Users that are interested in ChromeForensics are comparing it to the libraries listed below
Sorting:
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Open source Android Forensics app and framework☆390Aug 14, 2015Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- (SP)^3: A Simple, Practical, and Safe Packet Spoofing Protocol☆15Mar 13, 2017Updated 8 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- Forensic tool for examining Thumbs.db files☆14Jun 5, 2013Updated 12 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Extracts Windows user info including the password hashes☆40Jul 26, 2016Updated 9 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- An advanced memory forensics framework☆25Sep 25, 2014Updated 11 years ago
- An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.☆16Oct 27, 2024Updated last year
- ☆17Mar 22, 2018Updated 7 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- PS scripts for checking your certificate store, and code-signing status of executables.☆17Nov 25, 2015Updated 10 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago