droberson / Awesome-anti-forensicView external linksLinks
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
☆22Oct 5, 2019Updated 6 years ago
Alternatives and similar repositories for Awesome-anti-forensic
Users that are interested in Awesome-anti-forensic are comparing it to the libraries listed below
Sorting:
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Dec 31, 2019Updated 6 years ago
- ☆17Nov 9, 2018Updated 7 years ago
- ☆16May 4, 2017Updated 8 years ago
- Clear diverses Logs and History Files saved by Windows.☆23Oct 24, 2017Updated 8 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- 🔫 lkm module for emergency binary/script execution☆12Dec 22, 2017Updated 8 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Sep 13, 2019Updated 6 years ago
- A simple Metadata Removal Tool for images and videos using exiftool and ffmpeg in C and Python3.☆115Nov 23, 2025Updated 2 months ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- ESP32 based Wi-Fi Intrusion Detection System☆28May 11, 2025Updated 9 months ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 8 months ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 5 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- SSH proxy with HASSH firewalling capabilities☆30Jan 19, 2020Updated 6 years ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 8 months ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 4 months ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- An Android app with the only goal of being a secure, locked, no-third party, completely local open source password saving app☆34May 12, 2025Updated 9 months ago
- 蓝灯(Lantern)破解,手机版+win版☆10Apr 26, 2019Updated 6 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- The best vpn service 2022 Lifetime free anonymous Awesome dVPN foss Network decentralized Ethereum Blockchain DHT-VPN Peer-to-peer open-s…☆30Dec 14, 2022Updated 3 years ago
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆45Jan 18, 2024Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Repository for the Oulu University Security Engineering course.☆13Sep 12, 2025Updated 5 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆23Jan 17, 2026Updated last month
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 2 weeks ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago