cyberark / White-Phoenix
A tool to recover content from files encrypted with intermittent encryption
☆233Updated 2 months ago
Alternatives and similar repositories for White-Phoenix:
Users that are interested in White-Phoenix are comparing it to the libraries listed below
- ☆158Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆342Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆196Updated 3 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆77Updated 2 weeks ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆217Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆185Updated 2 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated 6 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆222Updated 6 months ago
- ☆212Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆354Updated 2 weeks ago
- ☆174Updated 4 months ago
- Map tracking ransomware, by OCD World Watch team☆464Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆152Updated 5 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆165Updated 3 weeks ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Collection of forensic tools☆619Updated last year
- Windows Malware Investigation Scripts & Docs☆81Updated 5 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆265Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- ☆136Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated last year
- A repository of credential stealer formats☆210Updated 3 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year