Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.
☆420Jul 25, 2025Updated 7 months ago
Alternatives and similar repositories for nyx
Users that are interested in nyx are comparing it to the libraries listed below
Sorting:
- WiFi Geolocation Spoofing with the ESP8266☆80May 17, 2018Updated 7 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- Local LLM Testing & Benchmarking for Apple Silicon☆56Feb 26, 2026Updated last week
- Linux kernel integrity monitor for detecting syscall hooking☆73Feb 16, 2026Updated 2 weeks ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆154Jan 26, 2026Updated last month
- Slim down your Docker images with the power of AI. Container Diet analyzes your images and Dockerfiles to provide actionable, context-awa…☆54Feb 18, 2026Updated 2 weeks ago
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆109Feb 17, 2025Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆12Sep 27, 2021Updated 4 years ago
- ☆11Dec 19, 2024Updated last year
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- [ARCHIVED] Evolved into BugTraceAI v2 — github.com/BugTraceAI/BugTraceAI☆239Feb 11, 2026Updated 3 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Nov 5, 2025Updated 4 months ago
- teler Caddy integrates the powerful security features of teler WAF into the Caddy web server, ensuring your web servers remain secure and…☆17Feb 24, 2025Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- Splice and merge videos from the terminal☆25Oct 4, 2025Updated 5 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated last month
- ☆29Oct 19, 2024Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- ☆31Mar 21, 2023Updated 2 years ago
- AI-powered terminal assistant that transforms command failures into learning opportunities. Automatically detects errors, analyzes contex…☆76Sep 4, 2025Updated 6 months ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- htpw is a project to increase the security of your WordPress!☆57Jan 21, 2026Updated last month
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago