☆454Feb 24, 2024Updated 2 years ago
Alternatives and similar repositories for iShutdown
Users that are interested in iShutdown are comparing it to the libraries listed below
Sorting:
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- Forensic toolkit for iOS sysdiagnose feature☆248Feb 26, 2026Updated last week
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- Forensic Artifact Collection Tool for macOS☆118Jul 28, 2025Updated 7 months ago
- Index and collection of MVT compatibile indicators of compromise.☆124Feb 18, 2026Updated 2 weeks ago
- A cross platform parser for Apple UnifiedLogs!☆331Feb 15, 2026Updated 2 weeks ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 9 months ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Nov 7, 2023Updated 2 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- iOS Logs, Events, And Plist Parser☆1,025Feb 24, 2026Updated last week
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,191Updated this week
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- yet another AV killer tool using BYOVD☆305Dec 12, 2023Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- ☆65Apr 28, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- Aftermath is a free macOS IR framework☆569Sep 25, 2025Updated 5 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Feb 17, 2025Updated last year
- Scripts to parse various iOS sysdiagnose logs. Based upon the forensic research of Mattia Epifani, Heather Mahalik and Cheeky4n6monkey.☆204Oct 29, 2022Updated 3 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated last month
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- ☆526Jan 2, 2024Updated 2 years ago