A collection of anti-forensics scripts
☆30Oct 19, 2025Updated 6 months ago
Alternatives and similar repositories for anti-forensics
Users that are interested in anti-forensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- This repository hosts the documentation for the mixminion protocol☆11May 26, 2010Updated 15 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆140Mar 14, 2018Updated 8 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 11 years ago
- Implementations of common data structures in C☆16Jul 20, 2022Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Development repository for the snort cookbook☆27Apr 21, 2026Updated last week
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 7 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A simple menu system for the Adafruit PiTFT for Raspberry Pi☆11Nov 23, 2016Updated 9 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 9 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 11 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- A Laravel Filament plugin for dynamic international currency masking using JavaScript Intl, supporting flexible currency and locale confi…☆14Jul 14, 2025Updated 9 months ago
- Find person in facebook with phone number☆11Apr 9, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple, yet powerful malware for windows☆11May 10, 2018Updated 7 years ago
- ☆13Apr 14, 2014Updated 12 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12May 21, 2024Updated last year
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ESP8266 + Websockets + Webserver + RC-Switch 433 Mhz + SmartThings☆10Dec 24, 2016Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31May 6, 2016Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Jul 14, 2015Updated 10 years ago
- ☆22May 29, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Make abliterated models with transformers, easy and fast☆40Nov 27, 2025Updated 5 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 7 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A mobile substrate tweak that adds features to whatsapp.☆20Aug 16, 2020Updated 5 years ago
- Show your Instagram profile on your website. 🌈☆27Jan 13, 2022Updated 4 years ago
- The kernel component of rootpipe fix for Mavericks☆27Apr 13, 2015Updated 11 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago