ashemery / DFIR-ICTCS17Links
Digital Forensics and Incident Response (DFIR) Workshop
☆10Updated 7 years ago
Alternatives and similar repositories for DFIR-ICTCS17
Users that are interested in DFIR-ICTCS17 are comparing it to the libraries listed below
Sorting:
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Automate email search in HaveIBeenPwned☆12Updated 4 years ago
- ☆12Updated 4 years ago
- ShellC0de Generator☆11Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆13Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Tutorials for getting started with Pwntools☆12Updated 3 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- Yet another powerful payload encoder/decoder☆13Updated 3 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- PHP tool to grab urls of a specific site.☆9Updated 6 years ago
- Static analysis of APKs with regular expressions☆10Updated 4 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆41Updated 4 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago