botherder / volatilityLinks
An advanced memory forensics framework
☆25Updated 10 years ago
Alternatives and similar repositories for volatility
Users that are interested in volatility are comparing it to the libraries listed below
Sorting:
- ☆37Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Script to scan sites for images containing embedded EXIF metadata☆14Updated 12 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Python pcap sanitizer☆21Updated 2 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Release of the sandy framework.☆39Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Encrypted Text Messaging☆148Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- ☆22Updated 9 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- ☆24Updated 10 years ago
- AFF is now being maintained at https://github.com/sshock/AFFLIBv3☆51Updated 10 years ago
- Public resources NB shares☆18Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago