cyberark / White-PhoenixLinks
A tool to recover content from files encrypted with intermittent encryption
☆239Updated 11 months ago
Alternatives and similar repositories for White-Phoenix
Users that are interested in White-Phoenix are comparing it to the libraries listed below
Sorting:
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆266Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- ☆171Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Updated last month
- Friendly graphical output of the nmap tool that allows filtering by open ports☆185Updated 3 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 4 months ago
- Windows Exploit Protection Settings (Ultimate) GUI☆73Updated 3 weeks ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- Another Hardening Windows Tool☆50Updated last year
- ☆269Updated 2 years ago
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆132Updated last month
- Collection of forensic tools☆686Updated 2 weeks ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆76Updated 4 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- Regular Expressions List used in Digital Forensic Tasks☆92Updated 11 months ago
- Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.☆109Updated 5 months ago
- A repository of credential stealer formats☆239Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆90Updated 3 years ago
- A categorized list of resources presented during the 2023 Sans OSINTSummit☆163Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- The DNA test for websites☆74Updated 2 months ago
- Wireshark RDP resources☆220Updated 7 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆283Updated 2 years ago
- Some settings stolen from multiple scripts @ZephrFish☆132Updated last month
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆174Updated 3 weeks ago
- Windows Forensics Environment Builder☆174Updated last month