S3mprGumb1 / whodunnitLinks
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
β16Updated 5 years ago
Alternatives and similar repositories for whodunnit
Users that are interested in whodunnit are comparing it to the libraries listed below
Sorting:
- Shellcode / Buffer Overflow π£β20Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposesβ21Updated 4 years ago
- Reddit domain search module for Recon-ngβ10Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.β6Updated 12 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.β13Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.β12Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- Work in Progress repoβ14Updated 6 years ago
- module for certexfilβ15Updated 2 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.β13Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C serverβ16Updated 7 years ago
- β13Updated 6 years ago
- Manticore's Public Threats Repositoryβ10Updated 4 years ago
- Powershell-based Windows Security Auditing Toolboxβ10Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident reβ¦β30Updated 8 years ago
- Fresh malware samples caught in the wild daily from random places. π£β18Updated 5 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)β14Updated 7 years ago
- Exploit for win10 SMB3.1β17Updated 5 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Formatβ15Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.β24Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β27Updated 8 years ago
- Identify common attack paths to get Domain Administratorβ22Updated 5 years ago
- This directory contains random scripts from threat hunting or malware researchβ11Updated 7 years ago
- DNS logging, detection, ...β15Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)β18Updated 11 years ago
- Free Email Providersβ10Updated last year
- ASLR Evasion, Egghunters, SEH Overwritesβ29Updated 4 years ago