frankwxu / UbaltLinks
Forensics Science Education
☆11Updated 4 years ago
Alternatives and similar repositories for Ubalt
Users that are interested in Ubalt are comparing it to the libraries listed below
Sorting:
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆16Updated 9 months ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆26Updated 6 years ago
- THOR APT Scanner User Manual☆18Updated 2 weeks ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆30Updated 6 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated 3 weeks ago
- Admin for☆17Updated 7 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Various components we use in labs☆10Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 3 weeks ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆50Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆15Updated last year