codejanus / study_SecurityLinks
☆25Updated 8 years ago
Alternatives and similar repositories for study_Security
Users that are interested in study_Security are comparing it to the libraries listed below
Sorting:
- Extracts Windows user info including the password hashes☆40Updated 9 years ago
- Windows anti-forensics USB monitoring tool.☆69Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Updated 5 years ago
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated this week
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Updated 7 months ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- Backstage Parser☆33Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 6 years ago
- Learning volatility plugins.☆18Updated 4 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- Low Interaction Mobile Honeypot☆96Updated 7 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆143Updated last month
- Automatic USB drive malware scanning tool for the security-minded person☆96Updated 9 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆60Updated 7 years ago
- ☆21Updated 2 years ago
- ☆33Updated last year
- Malicious Link Blog☆25Updated 2 years ago
- ☆16Updated 4 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆56Updated 6 years ago
- ☆29Updated last year
- Going through http://hacking-printers.net/☆39Updated 8 years ago
- CLI tools using Harpoon features☆24Updated 2 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆14Updated 5 years ago
- Get clients and access points.☆48Updated 6 years ago