Busindre / dumpzilla
Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆134Updated 4 years ago
Alternatives and similar repositories for dumpzilla:
Users that are interested in dumpzilla are comparing it to the libraries listed below
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆63Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Rogue AP killer☆89Updated 7 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- try privilege escalation changing sudo command☆119Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- ☆61Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 7 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆47Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆170Updated last month
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year