LGGGreg / skype-log-viewerView external linksLinks
Download and View Skype History Without Skype
☆56May 18, 2018Updated 7 years ago
Alternatives and similar repositories for skype-log-viewer
Users that are interested in skype-log-viewer are comparing it to the libraries listed below
Sorting:
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Brute forcer and shell deployer for WildFly☆101Mar 10, 2018Updated 7 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- Listing subdomains about a main domain☆58May 9, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Dec 4, 2017Updated 8 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- some pocs for antivirus evasion☆131Aug 28, 2023Updated 2 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- ☆23Feb 16, 2016Updated 9 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Nov 17, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Jun 30, 2018Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- 远控控制端☆10Mar 7, 2018Updated 7 years ago
- ☆12Aug 29, 2025Updated 5 months ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Jul 15, 2018Updated 7 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago