ch33r10 / StalkerwareLinks
☆25Updated 2 years ago
Alternatives and similar repositories for Stalkerware
Users that are interested in Stalkerware are comparing it to the libraries listed below
Sorting:
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- ☆39Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆14Updated 7 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 4 months ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- CyberChef update scripts in PowerShell & Bash☆16Updated last year
- For storing of the volumes☆4Updated 5 years ago
- repo for sharing stuff☆17Updated last month
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆80Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Batch scripts to capture volatile and log information from a target system☆20Updated 10 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 6 months ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- ☆22Updated 4 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago