DragonJAR Automatic Windows Forensic
☆13May 23, 2017Updated 8 years ago
Alternatives and similar repositories for DAWF
Users that are interested in DAWF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a library for .NET that allows you to invoke an external process, and expose its output as an async stream in C# 8.0.☆24Nov 12, 2025Updated 4 months ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆50Mar 5, 2026Updated 2 weeks ago
- A bash script to convert FROM gif, bmp, pdf, webp, pcx, pict, pct, png, tif, tiff, xcf, crw, cr2, arw, sr2 & nef TO jpg/jpeg formats.☆18May 12, 2015Updated 10 years ago
- Hacking around with CYD and BLE☆19Jan 22, 2025Updated last year
- Transparently tunnel your IP traffic through ICMP echo and reply packets☆19Feb 11, 2016Updated 10 years ago
- ☆16Aug 31, 2022Updated 3 years ago
- ☆17Nov 6, 2021Updated 4 years ago
- ☆25Dec 5, 2025Updated 3 months ago
- DeepSeek Pentest AI - Burp Suite extension☆57Sep 14, 2025Updated 6 months ago
- Repo contains samples and instructions for remote hosting of MCP servers built with the official Anthropic MCP SDKs on Azure Functions.☆47Dec 16, 2025Updated 3 months ago
- ☆37Jan 30, 2023Updated 3 years ago
- A multi-agent SOC/DFIR assistant powered by LangChain, LangGraph, and OpenAI models. Automates IOC extraction, MITRE ATT&CK mapping, CVE …☆69Updated this week
- HTBtui is a TUI (terminal user interface) client built with Textual for interacting with the Hack the Box api☆20May 7, 2024Updated last year
- A django based chat application where you can send messages encrypted using RSA algorithm.☆12Nov 4, 2019Updated 6 years ago
- ☆15Aug 10, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- ☆32Feb 6, 2018Updated 8 years ago
- Herramienta para banear cuentas de instagram automatica☆20May 4, 2021Updated 4 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- ☆36Sep 16, 2024Updated last year
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆16May 17, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- ☆12Dec 26, 2017Updated 8 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago