S3mprGumb1 / whodunnitLinks
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
☆16Updated 6 years ago
Alternatives and similar repositories for whodunnit
Users that are interested in whodunnit are comparing it to the libraries listed below
Sorting:
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆50Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Various tools to track the Mirai botnet☆20Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- ☆26Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- ☆15Updated 9 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 10 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Updated 6 years ago
- Random stuff☆16Updated 7 years ago
- My public exploit collection.☆31Updated 7 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- ☆14Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- A simple AES malware crypter☆16Updated 7 years ago