☆458Feb 24, 2024Updated 2 years ago
Alternatives and similar repositories for iShutdown
Users that are interested in iShutdown are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Forensic toolkit for iOS sysdiagnose feature☆254Updated this week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Index and collection of MVT compatibile indicators of compromise.☆130Apr 8, 2026Updated last week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,308Apr 13, 2026Updated last week
- Forensic Artifact Collection Tool for macOS☆119Jul 28, 2025Updated 8 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Extract compressed memory pages from page-aligned data☆47Sep 25, 2018Updated 7 years ago
- Scripts to parse various iOS sysdiagnose logs. Based upon the forensic research of Mattia Epifani, Heather Mahalik and Cheeky4n6monkey.☆206Oct 29, 2022Updated 3 years ago
- A cross platform parser for Apple UnifiedLogs!☆340Mar 8, 2026Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Indicators of stalkerware apps☆351Apr 10, 2026Updated last week
- ☆65Apr 28, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Tool to analyze a lot of APK files☆20Feb 21, 2026Updated 2 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- iOS Logs, Events, And Plist Parser☆1,060Updated this week
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- yet another AV killer tool using BYOVD☆311Dec 12, 2023Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆118Jan 26, 2022Updated 4 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 10 months ago
- OT security monitoring #nsacyber☆621Jan 7, 2024Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆12Jun 19, 2025Updated 10 months ago
- ESXi Cyber Security Incident Response Script☆27Sep 4, 2024Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆65Dec 18, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆820Updated this week
- ☆114Nov 19, 2023Updated 2 years ago
- Extract files from Apple devices on Windows, Linux and MacOS. Mostly a wrapper for pymobiledevice3. Creates iTunes-style backups and "adv…☆459Mar 25, 2026Updated 3 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆444Oct 1, 2025Updated 6 months ago