S3mprGumb1 / whodunnitLinks
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
☆16Updated 5 years ago
Alternatives and similar repositories for whodunnit
Users that are interested in whodunnit are comparing it to the libraries listed below
Sorting:
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Scan for open S3 buckets and dump☆10Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- python tools to assist in penetration testing☆14Updated 3 weeks ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- ☆14Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago