Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆143Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for dumpzilla
Users that are interested in dumpzilla are comparing it to the libraries listed below
Sorting:
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Distributed Network Vulnerability Scanner☆125Jan 23, 2019Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- Unofficial API & Client for dnsdumpster.com and hackertarget.com☆67Feb 9, 2019Updated 7 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Jan 31, 2025Updated last year
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Kirjuri is a web application for managing cases and physical forensic evidence items.☆107May 7, 2021Updated 4 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- ☆99May 3, 2018Updated 7 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 6 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Nov 12, 2022Updated 3 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆85May 10, 2018Updated 7 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A command line Hash Identifying tool.☆101Mar 17, 2019Updated 6 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆222Aug 4, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago