KoreLogicSecurity / ftimesLinks
A forensic system baselining, searching, and evidence collection tool
☆19Updated 5 years ago
Alternatives and similar repositories for ftimes
Users that are interested in ftimes are comparing it to the libraries listed below
Sorting:
- Tips to protect your personal and company data☆29Updated 5 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- A Passive DNS backend and collector☆31Updated 2 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- ☆37Updated 10 years ago
- PAM module and library for auditing/enforcing Password Topology Histogram Wear-Leveling☆21Updated 8 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated last year
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- A DNS database debugger☆35Updated 2 years ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated last month
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Checklists☆17Updated 8 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Network Tools☆32Updated last year
- Test Suite for John the Ripper☆24Updated 3 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 4 years ago
- Small snippets of code we often find useful☆11Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year