cyberark / White-Phoenix
A tool to recover content from files encrypted with intermittent encryption
☆225Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for White-Phoenix
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆309Updated 7 months ago
- ☆147Updated last year
- Collection of forensic tools☆518Updated 9 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆466Updated 3 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆280Updated 3 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆308Updated last month
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆261Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆231Updated 5 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆341Updated last month
- ☆169Updated last month
- An ADCS honeypot to catch attackers in your internal network.☆226Updated 4 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆180Updated 10 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆205Updated last month
- Python tool to check rootkits in Windows kernel☆169Updated last week
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆879Updated 4 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆172Updated 10 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆544Updated 3 weeks ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- ☆493Updated 7 months ago
- ☆467Updated 11 months ago
- CLI tools for forensic investigation of Windows artifacts☆315Updated 2 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆180Updated 2 months ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆432Updated last year
- ☆187Updated 3 weeks ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆130Updated 7 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆163Updated last year
- Free training course offered at Hack Space Con 2023☆132Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆285Updated last month
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆605Updated 3 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year