antagon / TCHunt-ng
Reveal encrypted files stored on a filesystem.
☆51Updated 5 years ago
Related projects: ⓘ
- Password analysis software☆37Updated 9 years ago
- Cryptowall Tooling & Information☆35Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆26Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- Rogue AP killer☆86Updated 6 years ago
- ☆52Updated this week
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆58Updated 6 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated 9 months ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆77Updated 4 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆54Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆48Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆42Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆47Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆84Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 8 years ago
- F-Secure Virus World Map / Console Edition☆69Updated 11 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Megatron - A System for Abuse- and Incident Handling☆41Updated 7 years ago
- Parallel APK analyzer☆51Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆65Updated 6 years ago
- a low-interaction honeypot☆92Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆63Updated 9 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆40Updated 8 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 8 years ago