☆11Feb 3, 2026Updated last month
Alternatives and similar repositories for CASE-Implementation-UFED-XML
Users that are interested in CASE-Implementation-UFED-XML are comparing it to the libraries listed below
Sorting:
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- A series of python scripts to extract information from SQLite Data Files☆21Nov 15, 2025Updated 3 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- hacking tool menu!☆26Aug 4, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Generate a root CA and create a signed subordinate CA from the generated AWS PCA (Private Certificate Authority) CSR☆11Jan 16, 2019Updated 7 years ago
- A timestamp and date decoder written for python 3☆41Jan 22, 2026Updated last month
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated last year
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 5 months ago
- File bài tập của sách☆12Sep 11, 2021Updated 4 years ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- PSScanner is made for IT administrators to scan corporate network, showing IP address, hostname, current logon user and serialnumber for …☆11Dec 29, 2023Updated 2 years ago
- ☆18Mar 13, 2025Updated 11 months ago
- ☆12Feb 12, 2026Updated 2 weeks ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 7 months ago
- Show Windows CPU performance, memory and temperature information on an ESP32 driven display☆10Sep 21, 2025Updated 5 months ago
- ☆15Apr 20, 2023Updated 2 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- SmartWatch Project on Arduino and Android☆12Aug 23, 2024Updated last year
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- WiFi Pineapple Community Packages☆12Nov 6, 2022Updated 3 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- This tool saves all your memories to your computer after you download your data from Snapchat.☆13Apr 11, 2023Updated 2 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Just a bunch of SQLite queries that are useful for manually parsing iOS databases or embedding in scripts☆14Jan 20, 2026Updated last month
- L3MON - Remote Android Managment Suite☆16Feb 4, 2020Updated 6 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Here are some of ethical hacking tools and scripts in python.☆11Dec 11, 2021Updated 4 years ago
- Apps for the Cheap Yellow Display☆13Dec 9, 2024Updated last year
- Simple Admin Finder☆11Apr 25, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago