ebemunk / phoenixLinks
phoenix is a small command line image forensics tool
☆49Updated 7 years ago
Alternatives and similar repositories for phoenix
Users that are interested in phoenix are comparing it to the libraries listed below
Sorting:
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A honeypot for malware that propagates via USB storage devices☆100Updated 10 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- eSentire additions to the nmap network scanner☆14Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- WordPress Honeypot☆34Updated 7 years ago
- Truehunter☆31Updated 4 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆89Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 11 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆50Updated 12 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- ☆39Updated 7 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆37Updated 10 years ago
- An Open framework to rate the exposure of ip addresses with services exposed to the internet☆31Updated 7 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- ☆31Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago