Automation Forensics Tool for Windows
☆44Sep 25, 2017Updated 8 years ago
Alternatives and similar repositories for afot
Users that are interested in afot are comparing it to the libraries listed below
Sorting:
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- A C++, header-only DID:x509 resolver☆17Jun 11, 2025Updated 8 months ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆16Jan 8, 2019Updated 7 years ago
- Data Lineage for Spark components and PowerBI/AAS showing up in Azure Purview☆19Jun 11, 2024Updated last year
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- "DV360 Duplicator" is a custom DV360 solution that allows to duplicate existing marketing campaigns and adjust their settings in Google S…☆20Jun 11, 2025Updated 8 months ago
- Bypass AMSI and Defender using Ordinal Values☆41Apr 15, 2020Updated 5 years ago
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- Teams Skill Bot template projects☆16Jan 18, 2023Updated 3 years ago
- ☆20Jul 12, 2024Updated last year
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- ☆21Jan 28, 2020Updated 6 years ago
- Sensors for the datacenter to protect against intruders and high temperatures☆18Sep 13, 2016Updated 9 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- The service broker libraries used by Visual Studio to exchange intra- and inter-process services☆28Updated this week
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 9 months ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Mar 15, 2015Updated 10 years ago
- ☆51Feb 5, 2014Updated 12 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- ☆26May 22, 2021Updated 4 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆179May 23, 2016Updated 9 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago