Collection of single use scripts I worte for windows forensics
☆27Feb 1, 2012Updated 14 years ago
Alternatives and similar repositories for pyforensics
Users that are interested in pyforensics are comparing it to the libraries listed below
Sorting:
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Nov 5, 2020Updated 5 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆15Sep 21, 2020Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Aug 27, 2014Updated 11 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Plugins for Metasploit Framework☆478Jan 18, 2019Updated 7 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- no longer maintained☆18Feb 22, 2018Updated 8 years ago
- ☆43Sep 2, 2016Updated 9 years ago
- Parse nmap scan data with Perl (official repo)☆37Jan 26, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago