breadtk / anti-forensicsLinks
A collection of anti-forensics scripts
☆30Updated 5 years ago
Alternatives and similar repositories for anti-forensics
Users that are interested in anti-forensics are comparing it to the libraries listed below
Sorting:
- Rogue AP killer☆90Updated 7 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- ☆61Updated 7 years ago
- ☆92Updated 7 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- The User Interface for GoCrack☆87Updated 3 weeks ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- unix wildcard attacks☆134Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 4 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 8 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- ☆86Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago