frankwxu / UbaltLinks
Forensics Science Education
☆11Updated 4 years ago
Alternatives and similar repositories for Ubalt
Users that are interested in Ubalt are comparing it to the libraries listed below
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated this week
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆15Updated last year
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆15Updated last year
- mift - a mobile image forensic toolkit☆45Updated last year
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Updated 7 months ago
- Admin for☆17Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆56Updated 8 months ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆16Updated 10 months ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆77Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Updated 4 years ago
- THOR APT Scanner User Manual☆18Updated this week
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆27Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated last month
- Miscellaneous tools for BloodHound☆18Updated 3 years ago