LGGGreg / skype-log-viewerLinks
Download and View Skype History Without Skype
☆57Updated 7 years ago
Alternatives and similar repositories for skype-log-viewer
Users that are interested in skype-log-viewer are comparing it to the libraries listed below
Sorting:
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 8 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- ☆25Updated 10 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- ☆16Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Updated 10 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 6 years ago
- Bluetooth Recon Script☆24Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Create custom Windows batch files from a configuration file☆32Updated 8 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- KIMS Multi AV Scanner by DSR!☆31Updated 5 years ago