Offensive-Forensic-Framework / OFF-ToolKitLinks
Registry Based Artifact Collection and Correlation
☆10Updated 10 years ago
Alternatives and similar repositories for OFF-ToolKit
Users that are interested in OFF-ToolKit are comparing it to the libraries listed below
Sorting:
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 9 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- VirusTotal tools☆92Updated 4 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- SlyPI☆20Updated 12 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- A Network Inspection Tool☆82Updated 7 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Scapy docs, examples, scripts and other stuff☆40Updated 10 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- ☆27Updated 8 years ago
- Just a collection of scripts☆40Updated 5 years ago