Sinder-Premium / ComputerForensics
☆13Updated this week
Related projects: ⓘ
- This config made in Phreakers madhureh☆8Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆12Updated 3 years ago
- ☆12Updated this week
- Collection of offensive tools targeting Microsoft Azure☆10Updated 2 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Updated last month
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆10Updated last week
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆17Updated 2 weeks ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆11Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 2 years ago
- Solution to SIH 22 problem statement Smart Attendance☆7Updated last year
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆12Updated last year
- The Advanced Automated Pentesting And Forensics Tool☆26Updated 10 months ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆10Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- Remembering numerous passwords from various different sites can be difficult for a user. So to provide some flexibility we can provide us…☆6Updated 2 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆10Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆9Updated 3 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Updated last year
- hacking tools awesome lists☆12Updated 7 years ago
- Nexus of Android banking Trojans☆14Updated 11 months ago