Claudio-C / awesome-datarecoveryLinks
Data recovery solutions
☆23Updated 4 years ago
Alternatives and similar repositories for awesome-datarecovery
Users that are interested in awesome-datarecovery are comparing it to the libraries listed below
Sorting:
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆47Updated 3 years ago
- CLI tools using Harpoon features☆22Updated last year
- Networks and Tools that are used to access and navigate on "darknets"☆49Updated last year
- Magical Bulk Whois (No CAPTCHA!) 🪄🪄🪄🪄🪄🚀🚀🚀🚀🚀☆14Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Map binary data into a beautiful chart☆13Updated 5 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year
- How long will it take to crack a hash ?☆28Updated 5 years ago
- The hacker technical cheat sheet☆41Updated last month
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 6 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 3 years ago
- Monitoring Registry and File Changes in Windows☆73Updated last year
- Spot the Surveillance is an open-source educational VR tool to help people identify street-level surveillance in their community. As each…☆37Updated 4 years ago
- Index and collection of MVT compatibile indicators of compromise.☆96Updated 3 weeks ago
- PDFExaminer Tool - Analyse PDF Malware☆60Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- A graphical network monitor for Unix modeled after etherman.☆52Updated 10 years ago
- An awesome list for all the awesome stuff I do. 🕶️☆29Updated last year
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆38Updated last month
- Add your configs for tmux☆16Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆52Updated 9 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Updated 2 years ago
- CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers…☆43Updated 7 months ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago