Data recovery solutions
☆24Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-datarecovery
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
Sorting:
- BootUnlocker for Nexus Devices -- Unlock your bootloader without fastboot☆35Jul 18, 2017Updated 8 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Notifications using Shoutrrr in GitHub Actions☆16Dec 9, 2025Updated 3 months ago
- Scrapes Audit Logs From Cloudflare and Streams to Std Out☆11May 6, 2025Updated 10 months ago
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- ☆11Apr 2, 2022Updated 3 years ago
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆15Updated this week
- Fixes to pyobd for modern hardware interfaces☆11Oct 3, 2015Updated 10 years ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- OSS License Open Data☆12Jun 28, 2019Updated 6 years ago
- Creador de un link iplogger☆13Sep 29, 2023Updated 2 years ago
- ☆12Aug 27, 2025Updated 6 months ago
- OpenSSF Endusers Working Group☆28Mar 21, 2024Updated last year
- Tool for visualizing the Open SSF Scorecard Api data in a human friendly way☆19Nov 27, 2025Updated 3 months ago
- Vuln Disclosure WG's new SIG☆11Jan 2, 2024Updated 2 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- ☆21Jan 28, 2026Updated last month
- Vault of Windows Registry forensic artifacts☆28Nov 12, 2025Updated 4 months ago
- Command line client for splitting secrets using Shamir's Secret Sharing Algorithm☆16Apr 2, 2017Updated 8 years ago
- Repo to hold mcp server for velociraptor☆32Jul 27, 2025Updated 7 months ago
- Script that switches monitor profiles automatically while Nvidia is streaming through GameStream.☆14Jan 15, 2023Updated 3 years ago
- python code generation from natural language prompt☆15Jun 30, 2022Updated 3 years ago
- ☆43Mar 9, 2016Updated 10 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- ☆11Jan 29, 2026Updated last month
- This is the criminal face recognition application can be used as surviellance system.☆21May 25, 2021Updated 4 years ago
- A simple UNIX Shell commands emulator that works within Vim☆17Jul 15, 2015Updated 10 years ago
- Midi 2 CV for Eurorack - 2 outputs based on 2 MCP4725 modules and PC817 opto☆11Apr 21, 2019Updated 6 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- Any img file extract dtb convert to dts after edit pack to original file!☆24Feb 1, 2024Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- Ensure that your Johnny Decimal system is neat and clean.☆17Nov 14, 2024Updated last year
- Vulnerability Management with SBOM☆20Updated this week
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago