GuidoBartoli / sherloq
An open-source digital image forensic toolset
☆2,618Updated 2 weeks ago
Related projects: ⓘ
- TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access p…☆3,078Updated 4 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,519Updated 10 months ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.☆4,195Updated 4 months ago
- ☆1,048Updated this week
- 🕵️♂️ Offensive Google framework.☆15,489Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆5,736Updated last month
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,596Updated 8 months ago
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆1,856Updated 2 months ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,026Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆7,468Updated last week
- Collections of tools and methods created to aid in OSINT collection☆2,758Updated last year
- List of Github repositories and articles with list of dorks for different search engines☆1,982Updated last week
- Scanning APK file for URIs, endpoints & secrets.☆4,856Updated 4 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆11,445Updated 6 months ago
- A collection of several hundred online tools for OSINT☆5,239Updated last month
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,314Updated 2 years ago
- Never ever ever use pixelation as a redaction technique☆7,720Updated 6 months ago
- Fetch information about a public Google document.☆820Updated 10 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,460Updated 8 months ago
- An HTTP toolkit for security research.☆6,055Updated 4 months ago
- The Deepfake Offensive Toolkit☆4,076Updated 3 months ago
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️☆5,542Updated 2 months ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆10,082Updated 3 weeks ago
- Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes☆5,178Updated last year
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆12,702Updated last month
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,506Updated 10 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,323Updated 2 months ago
- Reverse Engineer's Toolkit☆4,801Updated 5 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,660Updated 6 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,113Updated last year