Claudio-C / awesome-datarecoveryLinks
Data recovery solutions
☆23Updated 4 years ago
Alternatives and similar repositories for awesome-datarecovery
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
Sorting:
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- The hacker technical cheat sheet☆43Updated 5 months ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- How long will it take to crack a hash ?☆28Updated 5 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆40Updated 3 weeks ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 6 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆125Updated 4 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆47Updated 3 years ago
- CLI tools using Harpoon features☆22Updated 2 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆51Updated last year
- 🐠 A simple Google query builder for document file discovery☆27Updated 8 months ago
- A graphical network monitor for Unix modeled after etherman.☆55Updated 11 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆54Updated last year
- Packaging scripts and related configs for distributing Kismet☆48Updated 3 months ago
- Various pentest stuff☆24Updated 8 months ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- PDFExaminer Tool - Analyse PDF Malware☆63Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated last week
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆289Updated 2 years ago
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 3 years ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆33Updated 2 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆35Updated 7 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 4 years ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆46Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Updated 2 years ago