eLoopWoo / chrome-url-dumper
research chrome stored databases - dumping all urls
☆38Updated 7 years ago
Alternatives and similar repositories for chrome-url-dumper:
Users that are interested in chrome-url-dumper are comparing it to the libraries listed below
- iOS forensics utility☆12Updated 7 years ago
- Python scripts for doing Android or IOS mobile forensics☆24Updated 8 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆44Updated 6 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- ADB Based Acquisition Tool for Android Forensics☆41Updated 4 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- ☆18Updated 7 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- Notes on offensive training☆16Updated 7 years ago
- Custom Maltego transforms☆65Updated 10 years ago
- Scripts and tool for iOS app reversing☆24Updated 3 years ago
- Extracts Windows user info including the password hashes☆40Updated 8 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆29Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- ☆24Updated last year
- Social Engineering Toys☆36Updated 9 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆16Updated last year
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago