Claudio-C / awesome-datarecovery
Data recovery solutions
☆23Updated 3 years ago
Alternatives and similar repositories for awesome-datarecovery:
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆11Updated 2 months ago
- New version of the buildkit repository☆9Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- The hacker technical cheat sheet☆37Updated 2 weeks ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆60Updated 4 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- How long will it take to crack a hash ?☆29Updated 5 years ago
- ☆11Updated 4 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- A collection of malware that we use for testing and training☆12Updated 4 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆30Updated 2 years ago
- CLI tools using Harpoon features☆21Updated last year
- Collection of tools for processing storage media images☆13Updated 3 months ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- Networks and Tools that are used to access and navigate on "darknets"☆45Updated 10 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Binary and Static Releases☆14Updated this week