☆19Apr 27, 2025Updated 10 months ago
Alternatives and similar repositories for Digital-Forensics
Users that are interested in Digital-Forensics are comparing it to the libraries listed below
Sorting:
- Creating a LLM Powered PDF Reader with RAG☆21Mar 6, 2025Updated 11 months ago
- real time face swap and one-click video deepfake with only a single image☆14Sep 10, 2024Updated last year
- ☆11Aug 12, 2025Updated 6 months ago
- My Blog - https://0xresetti.github.io☆11Feb 25, 2026Updated last week
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆16Feb 22, 2026Updated last week
- This repository is dedicated to the SOC (Security Operations Center) Analyst course. It contains all the necessary resources, notes, scri…☆16Aug 31, 2024Updated last year
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated 2 months ago
- Hacker Rank - Bank Accounts☆12Jun 15, 2018Updated 7 years ago
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆18Jul 31, 2024Updated last year
- ☆10Mar 31, 2024Updated last year
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- 《亿级流量网站架构核心技术》 - 笔记☆12Nov 25, 2018Updated 7 years ago
- Fetch Tiktok account information - including their Username, Nickname, Bio, Region, User ID, Creation Date, Followers, Following, Likes a…☆12Sep 10, 2024Updated last year
- This Python script takes a hexadecimal string of digital binary data (from the two tracks of a debit card barcode) and obtains serial, ac…☆12Aug 4, 2020Updated 5 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- ☆12May 11, 2024Updated last year
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- ☆19Jul 23, 2025Updated 7 months ago
- ☆11Jan 25, 2023Updated 3 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 6 months ago
- CCNA v7 Packet Tracer explanations and codes☆21Feb 28, 2021Updated 5 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- custom evilginx2☆10Mar 10, 2024Updated last year
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- A Rust tool to recover .zip files passwords using bruteforce☆12Feb 9, 2026Updated 3 weeks ago
- church website☆12Apr 21, 2022Updated 3 years ago
- ☆14Feb 25, 2025Updated last year
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated last month
- Bot Seed Auto Claim 30 min,1Hour,2Hour,3Hour☆11Jun 23, 2024Updated last year
- An application for analysing crime and predicting them in a particular area by the use of data visualization☆13Nov 6, 2022Updated 3 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- This is a social media app built using the MERN stack. It includes authentication, posts, likes, comments, and follows.☆19Jul 14, 2024Updated last year
- cryptocrack 是一个用Python编写的密码自动破解框架,在basecrack的基础上进行功能完善,期望解决CTF中Crypto部分题型☆14Jan 6, 2023Updated 3 years ago
- Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.☆17Jul 3, 2024Updated last year
- ☆16Nov 26, 2024Updated last year
- This repository contains the Final Papers, mids, quizzes, assignments, labs, projects, books, reports, and my self-made notes semester-wi…☆18Sep 30, 2024Updated last year