Claudio-C / awesome-datarecoveryLinks
Data recovery solutions
☆23Updated 4 years ago
Alternatives and similar repositories for awesome-datarecovery
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
Sorting:
- Monitoring Registry and File Changes in Windows☆69Updated last year
- How long will it take to crack a hash ?☆28Updated 5 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆50Updated last year
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- CLI tools using Harpoon features☆22Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆47Updated 3 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers…☆43Updated 9 months ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆86Updated last month
- PDFExaminer Tool - Analyse PDF Malware☆63Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Updated last year
- A command line utility to interact and query the Centrifuge API.☆18Updated 2 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆125Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- Docker environment for hackers☆17Updated 5 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆73Updated 9 months ago
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆39Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆53Updated last year
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 6 years ago
- Collection of FOSS/Freeware. Most tools here are portable, which can be useful for when you are out-and-about. Obviously dedicated lab …☆24Updated 5 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆51Updated last year
- Kaseya REvil CNC domains☆12Updated last year