Claudio-C / awesome-datarecoveryLinks
Data recovery solutions
☆23Updated 3 years ago
Alternatives and similar repositories for awesome-datarecovery
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
Sorting:
- List of sources for cybersecurity news☆37Updated 2 years ago
- Personal Collection of Awesome Google Dorks☆30Updated 5 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆25Updated 3 years ago
- Password Lense: reveal character types in a password☆23Updated this week
- How long will it take to crack a hash ?☆29Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- extract info from apk files☆74Updated this week
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- CLI tools using Harpoon features☆21Updated last year
- ☆14Updated 4 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- ransomware, made for a demo on ransomware awareness and how easy it is to do☆14Updated 3 years ago
- ☆69Updated 6 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- Everything You Need☆18Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- A command line utility to interact and query the Centrifuge API.☆16Updated last year
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆8Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆14Updated 2 months ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 11 months ago
- A Collection of Android Malware☆17Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- The hacker technical cheat sheet☆39Updated this week
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆71Updated last year