antagon / TCHunt-ng
Reveal encrypted files stored on a filesystem.
☆52Updated 6 years ago
Alternatives and similar repositories for TCHunt-ng:
Users that are interested in TCHunt-ng are comparing it to the libraries listed below
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- Rogue AP killer☆89Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Password analysis software☆37Updated 9 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Truehunter☆31Updated 3 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆37Updated 10 years ago
- ☆46Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- ☆28Updated 4 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago