B2dfir / wlripLinks
WaitList.dat Parser
☆26Updated 7 years ago
Alternatives and similar repositories for wlrip
Users that are interested in wlrip are comparing it to the libraries listed below
Sorting:
- Truehunter☆30Updated 4 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆90Updated 3 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- Encrypt your personal files without giving up the convenience of cloud storage like Dropbox/OneDrive/Google Drive etc.☆20Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 6 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Updated 7 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- Web-app to identify the different types of hashes☆20Updated 2 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 9 years ago
- Truecrypt volume parsing library☆33Updated 5 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Web of trust grapher☆39Updated 7 months ago
- ☆56Updated 8 years ago
- https://gallery.technet.microsoft.com/PS2EXE-Convert-PowerShell-9e4e07f1☆14Updated 8 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago