S3mprGumb1 / whodunnitLinks
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
☆16Updated 5 years ago
Alternatives and similar repositories for whodunnit
Users that are interested in whodunnit are comparing it to the libraries listed below
Sorting:
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Random stuff☆16Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- My metasploit modules☆23Updated 9 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- ☆14Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- ☆12Updated 10 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 9 months ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- APT34/OILRIG leak☆12Updated 6 years ago
- My public exploit collection.☆31Updated 6 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago