ebemunk / phoenixLinks
phoenix is a small command line image forensics tool
☆48Updated 7 years ago
Alternatives and similar repositories for phoenix
Users that are interested in phoenix are comparing it to the libraries listed below
Sorting:
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- A steganalysis tool for detecting LSB steganography in images☆218Updated 6 years ago
- Truehunter☆31Updated 4 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- RSA cracking library☆9Updated 4 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Photo forensics tool that detects alteration of JPEG images☆10Updated 4 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Analyze and help extract older "hidden" versions of a pdf from the current pdf.☆87Updated 2 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆24Updated 9 years ago
- Funnel is a lightweight yara-based feed scraper☆39Updated 2 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 9 years ago
- A feedhunter's visualisation tool.☆16Updated 10 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 12 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆38Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 7 months ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago