aramosf / recoversqliteView external linksLinks
recover deleted information from sqlite files.
☆64Jun 17, 2016Updated 9 years ago
Alternatives and similar repositories for recoversqlite
Users that are interested in recoversqlite are comparing it to the libraries listed below
Sorting:
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Script to recover deleted entries in an SQLite database☆195Apr 12, 2016Updated 9 years ago
- GPS Spoofer Catcher, the GPS IDS.☆90Mar 26, 2017Updated 8 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- A Forensic SQLite Database Analyser and Reporting Tool written in Python 2.7.☆15Aug 6, 2018Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Oct 27, 2020Updated 5 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- A Swiss Army Knife for Windows Exploit Development.☆41Apr 12, 2016Updated 9 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- ☆90Mar 15, 2017Updated 8 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- lte security☆42Nov 17, 2015Updated 10 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Just a bunch of SQLite queries that are useful for manually parsing iOS databases or embedding in scripts☆14Jan 20, 2026Updated 3 weeks ago
- ☆12Jun 13, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Powerful commandline $MFT record editor.☆25Aug 15, 2015Updated 10 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- A Linux kernel IPC firewall and logger for Android and Binder☆145Feb 12, 2020Updated 6 years ago
- This is to edit a training forensic image file (raw/dd) and zero out all the unnecessary files.☆11Jun 21, 2025Updated 7 months ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- File/Web Text Scraper and Wordlist Generator☆40Oct 1, 2020Updated 5 years ago