cyberark / White-PhoenixLinks
A tool to recover content from files encrypted with intermittent encryption
☆235Updated 6 months ago
Alternatives and similar repositories for White-Phoenix
Users that are interested in White-Phoenix are comparing it to the libraries listed below
Sorting:
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 10 months ago
- A repository of credential stealer formats☆224Updated 2 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated last year
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆267Updated 2 years ago
- ☆161Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated 3 weeks ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Another Hardening Windows Tool☆51Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆377Updated last week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆74Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆162Updated this week
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆429Updated this week
- Some settings stolen from multiple scripts @ZephrFish☆129Updated 4 months ago
- Collection of forensic tools☆657Updated 3 months ago
- ☆267Updated 2 years ago
- ☆547Updated last year
- CLI tools for forensic investigation of Windows artifacts☆346Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆382Updated last year
- ShellSweeping the evil.☆179Updated 9 months ago
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆263Updated 5 months ago
- Just some lists of Malware Configs☆172Updated 7 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆181Updated 5 months ago
- Windows Exploit Protection Settings (Ultimate) GUI☆72Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆175Updated 3 months ago
- ☆197Updated last year