KoreLogicSecurity / ftimesLinks
A forensic system baselining, searching, and evidence collection tool
☆19Updated 5 years ago
Alternatives and similar repositories for ftimes
Users that are interested in ftimes are comparing it to the libraries listed below
Sorting:
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 11 months ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated last month
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 11 months ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- The online version of Ciphey☆18Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- DNS logging, detection, ...☆15Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Checklists☆17Updated 8 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Tips to protect your personal and company data☆29Updated 5 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year