Registry Based Artifact Collection and Correlation
☆10Aug 18, 2015Updated 10 years ago
Alternatives and similar repositories for OFF-ToolKit
Users that are interested in OFF-ToolKit are comparing it to the libraries listed below
Sorting:
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- Binary resource copier☆99Apr 14, 2025Updated 10 months ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- node.js web scraper for roblox.com☆13Sep 17, 2014Updated 11 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Helvetica Themes for TaskPaper☆20Oct 30, 2011Updated 14 years ago
- Ambush Host Intrusion Prevention System☆65Sep 8, 2013Updated 12 years ago
- Analysing Reddit user data.☆12May 5, 2014Updated 11 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- ☆231Nov 21, 2015Updated 10 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- pIpe is ifttt for websites/webservices linked to webservices/smartphones/desktops with advanced filters☆224Oct 1, 2012Updated 13 years ago
- Script to create Debian Squeeze & Wheezy Amazon Machine Images (AMIs) and Google Compute Engine images☆35Jun 17, 2014Updated 11 years ago
- NO LONGER MAINTAINED. Read the README for more info.☆11May 20, 2018Updated 7 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- ☆13May 18, 2014Updated 11 years ago
- ArduiPi is a shield for Raspberry Pi that brings Arduino low level extented I/O to Raspberry Pi☆24Mar 22, 2014Updated 11 years ago
- ☆10Jan 30, 2026Updated last month
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- [UNMAINTAINED] Track deployments with capistrano☆20Mar 19, 2015Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Development tools for Atari Jaguar 64☆10Jan 30, 2015Updated 11 years ago