Toolkit for Filesystem based Data Hiding Techniques.
☆39Sep 13, 2019Updated 6 years ago
Alternatives and similar repositories for fishy
Users that are interested in fishy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 4, 2017Updated 8 years ago
- Downloads ghidra processor manuals and puts them in the right folders for you automatically☆19Sep 29, 2024Updated last year
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Dec 31, 2019Updated 6 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆18Nov 27, 2019Updated 6 years ago
- 🔵 ethereum grid trading bot☆36Oct 10, 2025Updated 5 months ago
- ☆25May 27, 2025Updated 9 months ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Slides from my PhD thesis defense at MIT CSAIL, October 2018☆10Mar 4, 2019Updated 7 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆14Jan 6, 2021Updated 5 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.☆23Jul 22, 2023Updated 2 years ago
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated 3 weeks ago
- A small mod to make carts drop themselves instead of their components☆13Nov 26, 2022Updated 3 years ago
- ☆13Jan 28, 2026Updated last month
- volatility explorer☆92Nov 16, 2020Updated 5 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- ☆11Dec 31, 2023Updated 2 years ago
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- Volatility3 plugins developed and maintained by the community☆64Mar 19, 2023Updated 3 years ago
- BSim signatures and databases for Ghidra to recover function symbols with☆13Jul 11, 2024Updated last year
- Dump quarantined files from Windows Defender☆75Apr 6, 2022Updated 3 years ago
- vncreplay replays a VNC session from captured network traffic☆10Apr 15, 2025Updated 11 months ago
- enable kmem without rebooting☆23May 6, 2012Updated 13 years ago
- DC25 Party Badge☆11Aug 7, 2017Updated 8 years ago
- An NTFS/FAT parser for digital forensics & incident response☆224Oct 31, 2025Updated 4 months ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Patched GDB-Multiarch to debug android Kernels.☆14Jun 29, 2019Updated 6 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Red Team Ethics, resources and more☆17Feb 9, 2020Updated 6 years ago
- From 2011: Quickly search for files in NTFS volumes parsing the Master File Table (MFT). A decent amount of how NTFS and MFT work was pai…☆29Oct 14, 2019Updated 6 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆102May 10, 2017Updated 8 years ago
- A statically typed version of pest.☆12Dec 2, 2025Updated 3 months ago
- ☆13Jan 7, 2015Updated 11 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year