Busindre / dumpzillaLinks
Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆145Updated 4 years ago
Alternatives and similar repositories for dumpzilla
Users that are interested in dumpzilla are comparing it to the libraries listed below
Sorting:
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- penetration testing scripts☆136Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆220Updated 7 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- The User Interface for GoCrack☆88Updated last month
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- A toolkit for Security Researchers☆128Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated 2 years ago
- Truehunter☆31Updated 4 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- archive of code from http://www.unicornscan.org/☆79Updated 13 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago