☆156Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for DIGITAL-FORENSICS
Users that are interested in DIGITAL-FORENSICS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lab Exercises☆40Nov 11, 2025Updated 4 months ago
- ☆58Oct 30, 2025Updated 4 months ago
- ☆36Oct 30, 2025Updated 4 months ago
- ☆90Oct 28, 2025Updated 4 months ago
- ☆85Oct 27, 2025Updated 4 months ago
- ☆56Oct 30, 2025Updated 4 months ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last week
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆13Mar 4, 2026Updated 3 weeks ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 5 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- Проект помогает фронтенд-разработчикам освоить структуры данных через практические примеры на JavaScript☆21Sep 14, 2025Updated 6 months ago
- SMSBOX is a tool to send anonymous messages. This script uses the Textbelt API to work, Textbelt is an API that allows us to send a singl…☆17Jul 1, 2025Updated 8 months ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- A full-page news monitor with different sections for an RSS feed, trending Mastodon links and hashtags, and posts from any Mastodon hasht…☆14Apr 21, 2025Updated 11 months ago
- Perspt: **Per**sonal **S**pectrum **P**ertaining **T**houghts – the human lens through which we explore the enigma of AI and its implicat…☆31Updated this week
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆39Sep 20, 2025Updated 6 months ago
- ☆25Feb 20, 2026Updated last month
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 3 months ago
- BloodRecon — 🧠 Master the art of digital hunting with 34+ OSINT modules.☆21Jul 31, 2025Updated 7 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- 𝐌𝐞𝐭𝐚 𝐒𝐜𝐚𝐧 is an OSINT tool for Facebook that uses the Facebook Pages Scraper API from the RAPIDAPI website, developed for use wit…☆33Sep 9, 2025Updated 6 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 7 months ago
- pSlip is an Android static analysis tool kit designed to find potentially vulnerable escalation paths by analyzing exported components, i…☆26Jan 24, 2026Updated 2 months ago
- Realtime location tool in node js☆14Apr 27, 2023Updated 2 years ago
- Delimiter-separated values (DSV) format parser for GNU Guile.☆19Jan 6, 2026Updated 2 months ago
- ☆59Dec 10, 2025Updated 3 months ago
- Malware traffic obfuscation library☆37Jul 24, 2025Updated 8 months ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- ☆57Nov 18, 2025Updated 4 months ago
- A telegram desktop theme in stylish ubuntu design pattern.☆10Aug 19, 2022Updated 3 years ago
- sleep for x86_64 Linux from scratch☆52Dec 9, 2025Updated 3 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year