eLoopWoo / chrome-url-dumper
research chrome stored databases - dumping all urls
☆34Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for chrome-url-dumper
- iOS forensics utility☆12Updated 6 years ago
- A Maltego transform for VirusTotal Submitter Information☆31Updated 5 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 3 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆13Updated 8 months ago
- isodump - ISO dump utility☆38Updated 5 years ago
- Small scripts and POCs related to digital forensics☆17Updated 2 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 2 years ago
- A Gmail credential harvester☆9Updated 5 months ago
- ☆24Updated last year
- Automation Forensics Tool for Windows☆42Updated 7 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Updated 7 years ago
- ADB Based Acquisition Tool for Android Forensics☆40Updated 3 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- ☆17Updated 10 months ago
- DPE - Default Password Enumeration☆32Updated 11 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Misc Tools for Virus Total Interaction☆35Updated 6 years ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 5 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- Placeholder for IRIS-H Digital Forensics Tool☆12Updated 6 years ago
- Batch scripts to capture volatile and log information from a target system☆19Updated 10 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Open Standard Vulnerability & Compliance Scanner☆41Updated 9 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago