S3mprGumb1 / whodunnitLinks
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
☆16Updated 5 years ago
Alternatives and similar repositories for whodunnit
Users that are interested in whodunnit are comparing it to the libraries listed below
Sorting:
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- ☆12Updated 4 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- ☆35Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Work in Progress repo☆14Updated 6 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Software exploitation training material☆15Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Updated 8 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago