S3mprGumb1 / whodunnitLinks
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
☆15Updated 6 years ago
Alternatives and similar repositories for whodunnit
Users that are interested in whodunnit are comparing it to the libraries listed below
Sorting:
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Open-source Exploiting Framework☆31Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- My metasploit modules☆24Updated 10 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Software exploitation training material☆16Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 12 years ago
- Notes on offensive training☆16Updated 8 years ago
- ☆15Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 8 years ago
- Various exploits☆10Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- ☆15Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 9 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Updated 10 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- python tools to assist in penetration testing☆14Updated last week