Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner
☆30Feb 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for SimpleImager
Users that are interested in SimpleImager are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆12May 27, 2023Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Apr 23, 2025Updated 11 months ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆18Aug 30, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- ExeSpy is a cross-platform PE viewer for EXE and DLL files☆73Feb 19, 2025Updated last year
- List of OSINT resources☆17Dec 17, 2020Updated 5 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆18Jul 26, 2024Updated last year
- Ransomware groups posts☆44Mar 3, 2026Updated 3 weeks ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆77May 21, 2024Updated last year
- A set of social media OSINT tools that I use when participating in Trace Labs Search Party CTF☆77Jan 1, 2024Updated 2 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Do DFIR work in a Windows Sandbox☆21Updated this week
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- bevigil-cli provides a unified command line interface and python library for using BeVigil OSINT API.☆136Sep 18, 2023Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆75Dec 30, 2025Updated 2 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- The best tools and resources for forensic analysis.☆169Feb 24, 2023Updated 3 years ago
- Current links from the OSINT Inception start-me project☆195May 15, 2023Updated 2 years ago
- cURL Tool Usage for OSINT (Open-Source Intelligence)☆253Feb 4, 2023Updated 3 years ago
- Flipper Zero FW [insane]☆10Sep 9, 2022Updated 3 years ago
- Easy and fast file sharing from the command-line.☆12Nov 22, 2022Updated 3 years ago
- This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices☆161May 21, 2020Updated 5 years ago
- ☆16Jul 27, 2025Updated 7 months ago
- ☆11Jul 20, 2020Updated 5 years ago
- Docker image for osint☆135Jan 2, 2022Updated 4 years ago
- Flipper Zero application and RC2014 module allowing the Flipper to be used as a controller for ColecoVision games.☆15May 27, 2023Updated 2 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago