ebemunk / phoenixLinks
phoenix is a small command line image forensics tool
☆48Updated 7 years ago
Alternatives and similar repositories for phoenix
Users that are interested in phoenix are comparing it to the libraries listed below
Sorting:
- Osmocom SS7 stack, with Shadytel modifications.☆18Updated 12 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Truehunter☆31Updated 4 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 4 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆50Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- hashdb block hash database tool and API☆44Updated 6 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 5 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Resources for HFS+ Forensics☆37Updated 9 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- ☆24Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Metasploit Framework with Viproy installed.☆37Updated 8 years ago
- MantaRay Automated Computer Forensic Triage Tool☆64Updated 6 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- ☆56Updated 7 years ago
- ☆15Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- ☆39Updated 9 years ago
- Automated image forensics tool☆499Updated 8 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- VirusTotal tools☆91Updated 4 years ago
- DNS traffic indexer and analyzer☆26Updated 10 years ago