cyberark / White-PhoenixLinks
A tool to recover content from files encrypted with intermittent encryption
☆238Updated 8 months ago
Alternatives and similar repositories for White-Phoenix
Users that are interested in White-Phoenix are comparing it to the libraries listed below
Sorting:
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆269Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆233Updated last year
- ☆165Updated 2 years ago
- Collection of forensic tools☆667Updated 6 months ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆75Updated 3 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆87Updated last week
- A repository of credential stealer formats☆229Updated 4 months ago
- Some settings stolen from multiple scripts @ZephrFish☆131Updated 6 months ago
- Windows Exploit Protection Settings (Ultimate) GUI☆70Updated 3 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆170Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
- Another Hardening Windows Tool☆51Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- CLI tools for forensic investigation of Windows artifacts☆346Updated 3 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆439Updated last week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆380Updated last month
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- ☆269Updated 2 years ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆393Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆107Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated 6 months ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- Windows 10/11 hardening scripts☆259Updated last month
- Wireshark RDP resources☆216Updated 4 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆190Updated 7 months ago
- The DNA test for websites☆74Updated 4 months ago