Busindre / dumpzillaLinks
Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆143Updated this week
Alternatives and similar repositories for dumpzilla
Users that are interested in dumpzilla are comparing it to the libraries listed below
Sorting:
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- The User Interface for GoCrack☆88Updated 3 weeks ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- ☆102Updated 6 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- penetration testing scripts☆136Updated 6 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- SMB Relay Attack Script☆148Updated 7 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- A toolkit for Security Researchers☆129Updated 6 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Exfiltrate data with ICMP☆101Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆222Updated 7 years ago
- Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.☆33Updated 7 years ago