Claudio-C / awesome-datarecoveryLinks
Data recovery solutions
☆23Updated 4 years ago
Alternatives and similar repositories for awesome-datarecovery
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
Sorting:
- How long will it take to crack a hash ?☆28Updated 5 years ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- A graphical network monitor for Unix modeled after etherman.☆53Updated 11 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆47Updated 3 years ago
- OSINT license plate data by scraping lookup site(s)☆13Updated 2 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆49Updated last year
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆52Updated 10 months ago
- CLI tools using Harpoon features☆22Updated last year
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆31Updated 2 years ago
- Other tools developed by CIRT.net☆23Updated 5 years ago
- This is a cli version of the cheat sheet for easy access. It can be navigated without using commands.☆88Updated 7 months ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 6 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 3 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year
- 🐠 A simple Google query builder for document file discovery☆27Updated 5 months ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆47Updated 3 years ago
- The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.☆94Updated last year
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆121Updated this week
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆26Updated 3 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆38Updated 2 months ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆70Updated 8 months ago
- Monitoring Registry and File Changes in Windows☆72Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- The hacker technical cheat sheet☆41Updated 2 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago