ebemunk / phoenix
phoenix is a small command line image forensics tool
☆48Updated 7 years ago
Alternatives and similar repositories for phoenix
Users that are interested in phoenix are comparing it to the libraries listed below
Sorting:
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Updated 7 years ago
- Photo forensics tool that detects alteration of JPEG images☆10Updated 4 years ago
- Automated image forensics tool☆497Updated 8 years ago
- GSM Sniffer☆35Updated 13 years ago
- A steganalysis tool for detecting LSB steganography in images☆214Updated 6 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆308Updated 11 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 9 years ago
- Hybrid Port Knocking System☆22Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Updated 2 years ago
- kills all TCP connections on a network☆40Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Public resources NB shares☆18Updated 9 years ago
- Exploits and research stuffs☆54Updated last year
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- exifprobe☆13Updated 2 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 10 years ago
- An advanced memory forensics framework☆25Updated 10 years ago