ebemunk / phoenix
phoenix is a small command line image forensics tool
☆48Updated 7 years ago
Alternatives and similar repositories for phoenix:
Users that are interested in phoenix are comparing it to the libraries listed below
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆51Updated 3 years ago
- ☆36Updated 12 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- hashdb block hash database tool and API☆44Updated 6 years ago
- A visual fuzzer written in NodeJS to find Zalgo characters☆52Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- recover deleted information from sqlite files.☆62Updated 8 years ago
- ☆24Updated last year
- ☆24Updated 9 years ago
- Analyze and help extract older "hidden" versions of a pdf from the current pdf.☆82Updated 2 years ago
- ESPot - ElasticSearch Honeypot☆27Updated 10 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Updated 7 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated 10 months ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago
- Builds json representation of PDF malware sample☆52Updated 13 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆50Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 4 months ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Digital Forensics Virtual File System (dfVFS)☆207Updated 3 months ago
- Password analysis software☆37Updated 9 years ago
- A honeypot for malware that propagates via USB storage devices☆97Updated 10 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆85Updated 10 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Updated 8 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Updated 9 years ago
- Collating patches for gpart from all distributions☆29Updated last year
- A feedhunter's visualisation tool.☆16Updated 10 years ago
- Photo forensics tool that detects alteration of JPEG images☆10Updated 3 years ago