S3mprGumb1 / whodunnit
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
☆16Updated 5 years ago
Alternatives and similar repositories for whodunnit:
Users that are interested in whodunnit are comparing it to the libraries listed below
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Work in Progress repo☆14Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- PoC for CVE-2020-11651☆7Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Files related to my training classes☆15Updated 3 years ago
- ☆24Updated 6 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Useful Windows and AD tools☆15Updated 2 years ago