cyberark / White-Phoenix
A tool to recover content from files encrypted with intermittent encryption
☆229Updated this week
Alternatives and similar repositories for White-Phoenix:
Users that are interested in White-Phoenix are comparing it to the libraries listed below
- ☆155Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆217Updated 4 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆262Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆950Updated 7 months ago
- ☆485Updated last year
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆442Updated last year
- Collection of forensic tools☆559Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆193Updated last month
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆272Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆361Updated 3 weeks ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆174Updated 2 years ago
- ☆173Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆325Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆192Updated 2 weeks ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆348Updated 3 weeks ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆189Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Free training course offered at Hack Space Con 2023☆137Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆320Updated 6 months ago
- ☆199Updated 3 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆269Updated 2 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆508Updated 6 months ago
- ☆698Updated 2 weeks ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆180Updated this week
- ☆530Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- Advanced Bash script designed for conducting digital forensics on Linux systems☆138Updated 10 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆314Updated 4 months ago
- A repository of credential stealer formats☆193Updated last month
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆390Updated 3 months ago