cyberark / White-Phoenix
A tool to recover content from files encrypted with intermittent encryption
☆231Updated last month
Alternatives and similar repositories for White-Phoenix:
Users that are interested in White-Phoenix are comparing it to the libraries listed below
- ☆158Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- Collection of forensic tools☆596Updated last year
- A repository of credential stealer formats☆204Updated this week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆333Updated 7 months ago
- CLI tools for forensic investigation of Windows artifacts☆328Updated 5 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆315Updated 5 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆265Updated 2 years ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆176Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆350Updated 2 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆220Updated 5 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated 9 months ago
- Free training course offered at Hack Space Con 2023☆138Updated last year
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆72Updated 3 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆211Updated this week
- Windows Malware Investigation Scripts & Docs☆81Updated 4 months ago
- Map tracking ransomware, by OCD World Watch team☆463Updated 3 weeks ago
- ☆200Updated 5 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆184Updated last month
- Windows Exploit Protection Settings (Ultimate)☆63Updated this week
- ☆174Updated 3 months ago
- ☆701Updated last month
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated 11 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆409Updated 2 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month