Se trata de un análisis forense de un caso real, que por medio de una imagen, se obtiene una serie de datos que ayudan a una investigación.
☆22May 11, 2018Updated 7 years ago
Alternatives and similar repositories for forense-autopsy
Users that are interested in forense-autopsy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- ☆24Jul 14, 2021Updated 4 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- HackTheBox rich presence for Discord☆13May 30, 2024Updated last year
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Kali Linux Network Scanning Cookbook Second Edition, published by Packt☆18Dec 15, 2020Updated 5 years ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆20Nov 11, 2021Updated 4 years ago
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- Este repositorio es un recurso completo para aprender sobre Linux, Bash scripting y ciberseguridad. Incluye guías prácticas detalladas, h…☆26Mar 24, 2026Updated last week
- OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.☆174Nov 11, 2025Updated 4 months ago
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- Community curated list of templates for the OSINT template engine.☆22Jul 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆20Apr 3, 2024Updated last year
- Un proyecto sobre metadatos del guild de ciberseguridad☆12Dec 6, 2023Updated 2 years ago
- A cross site scripting command and control notification server☆23Mar 24, 2024Updated 2 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Config files for my GitHub profile.☆31Mar 17, 2026Updated last week
- Dirty script written to parse TikTok JSON files☆11May 10, 2020Updated 5 years ago
- CEH v13 i-labs , CEH v13 Engage Answers☆37Jul 5, 2025Updated 8 months ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- WAScan - Web Application Scanner☆19Mar 22, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆49Jul 31, 2023Updated 2 years ago
- Netcat binaries compiled for ARM that work on Android devices☆12Jun 12, 2015Updated 10 years ago
- Simple username generator based on a list of name and surname☆13May 20, 2021Updated 4 years ago
- dotfiles about riverwm wayland☆19Feb 5, 2024Updated 2 years ago
- Made it possible for **everyone** to walk around in a Zoom Meeting with Breakout Rooms, pre-September 21, 2020!☆15Sep 12, 2020Updated 5 years ago
- A Gruvbox Dark theme for Yazi☆20Aug 16, 2025Updated 7 months ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- Guide to get started with Windows Managers(wm) in linux☆15May 30, 2024Updated last year
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆21Jul 13, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆14Jan 2, 2026Updated 2 months ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated 2 months ago
- ☆13Dec 29, 2020Updated 5 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆19May 25, 2023Updated 2 years ago
- Actualización de Huron, distro Linux para Osint☆21Jul 30, 2019Updated 6 years ago