Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files
☆77Jan 10, 2022Updated 4 years ago
Alternatives and similar repositories for Messenger-Forensics
Users that are interested in Messenger-Forensics are comparing it to the libraries listed below
Sorting:
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆51Jan 26, 2025Updated last year
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 9 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- A script to convert a Cellebrite UFDR to the original file structure.☆74Mar 21, 2022Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- ☆344Sep 23, 2025Updated 5 months ago
- ☆82Apr 22, 2022Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Oct 12, 2021Updated 4 years ago
- Resources provided by the community that can serve to be useful for Law Enforcement worldwide☆118Jul 25, 2024Updated last year
- Avilla Forensics FREE☆973Dec 10, 2025Updated 2 months ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Bash script to extract data from an Android device☆278Oct 28, 2022Updated 3 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 2 months ago
- A python app using kivy and pynput to log and upload mouse dynamics.☆27Apr 24, 2022Updated 3 years ago
- Execute tasks across SSH hosts using random selection☆17May 6, 2020Updated 5 years ago
- A curated list of iOS Forensics References, organized by folder with specific references (links to blog post, research paper, articles, a…☆227Dec 1, 2023Updated 2 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆30Nov 8, 2021Updated 4 years ago
- 🕵🏽 macOS Big Sur desktop app to monitor active TCP connections through the lens of GreyNoise☆33Jun 11, 2022Updated 3 years ago
- SpyStroke is an advanced and lightweight keylogger designed for ethical hacking and cybersecurity research. It captures keystrokes silent…☆14Jul 28, 2025Updated 7 months ago
- A Telegram Message forward or backup or clone ( or whatever you want to call it) bot.☆13Dec 15, 2025Updated 2 months ago