carmaa / interrogateLinks
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
☆79Updated 6 years ago
Alternatives and similar repositories for interrogate
Users that are interested in interrogate are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Windows Trollware and Persistence Script☆13Updated 10 years ago
- See here:☆43Updated 12 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 14 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- eSentire additions to the nmap network scanner☆14Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- ☆58Updated 10 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago