Busindre / dumpzilla
Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆132Updated 3 years ago
Alternatives and similar repositories for dumpzilla:
Users that are interested in dumpzilla are comparing it to the libraries listed below
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- penetration testing scripts☆136Updated 5 years ago
- A toolkit for Security Researchers☆126Updated 5 years ago
- GreyNoise Query Language☆82Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆145Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆115Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- Rogue AP killer☆89Updated 7 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆40Updated 8 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- unix wildcard attacks☆131Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago