A collection of anti-forensics scripts
☆29Oct 19, 2025Updated 5 months ago
Alternatives and similar repositories for anti-forensics
Users that are interested in anti-forensics are comparing it to the libraries listed below
Sorting:
- for the louise☆242Aug 9, 2020Updated 5 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Mar 14, 2018Updated 8 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Development repository for the snort cookbook☆27Mar 2, 2026Updated 2 weeks ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- This app is used to poll and alert if a new Home appears in daft.☆11Dec 9, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Access a MPR121 breakout using Node.js from a Raspberry Pi or BeagleBone Black.☆10May 20, 2023Updated 2 years ago
- A simple menu system for the Adafruit PiTFT for Raspberry Pi☆11Nov 23, 2016Updated 9 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- ☆10Jul 23, 2015Updated 10 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 10 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Simple asynchronous back end for Slack apps☆12Jan 12, 2023Updated 3 years ago
- ITL☆15Feb 19, 2019Updated 7 years ago
- A Laravel Filament plugin for dynamic international currency masking using JavaScript Intl, supporting flexible currency and locale confi…☆14Jul 14, 2025Updated 8 months ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Find person in facebook with phone number☆11Apr 9, 2017Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- ☆13Apr 14, 2014Updated 11 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 6 years ago