antagon / TCHunt-ngView external linksLinks
Reveal encrypted files stored on a filesystem.
☆53Nov 9, 2018Updated 7 years ago
Alternatives and similar repositories for TCHunt-ng
Users that are interested in TCHunt-ng are comparing it to the libraries listed below
Sorting:
- Quickly find encrypted files and files made-up of random data☆24Jun 20, 2019Updated 6 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Arch Linux installation, security hardening and automatic deployment setup scripts.☆20Jul 24, 2016Updated 9 years ago
- A showcase of Macchina-related libraries, projects, and initiatives.☆12Dec 31, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- ☆14May 17, 2018Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- drop-in replacement for graphite node using Riak TS☆13Aug 6, 2016Updated 9 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆20Mar 26, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 2 months ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- The modular distributed fingerprinting engine☆219Aug 6, 2018Updated 7 years ago
- Tool to parse SRU database☆25Mar 1, 2018Updated 7 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- GitHub CLone: automatically fork, clone, and setup an upstream remote for a GitHub repository☆25Dec 2, 2019Updated 6 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- ☆11Nov 22, 2024Updated last year
- 3D-printable M2 enclosures designed by Macchina☆25Nov 27, 2019Updated 6 years ago
- Smoking Linux Every Day!☆56Jul 18, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- A validating recursive DNS resolver library and standalone server with DNSSEC support☆34Nov 27, 2021Updated 4 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago