int0x80 / anti-forensics
for the louise
☆242Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for anti-forensics
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆258Updated 8 years ago
- Automated Linux evil maid attack☆419Updated 8 years ago
- Transparent network tap☆116Updated 9 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- ☆140Updated 8 years ago
- Snarf man-in-the-middle / relay suite☆202Updated 8 years ago
- ☆423Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Duct Tape Command and Control!☆94Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- pastebin.com Content Monitoring Tool☆193Updated 12 years ago
- Guaranteed cracking of M$ Office files using RC4 40-bit encryption☆81Updated 7 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆140Updated 9 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆181Updated 8 years ago
- Get your APT on using social media as a tool for data exfiltration.☆143Updated last year
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆232Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆43Updated 9 years ago
- ☆229Updated 4 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆36Updated 5 years ago
- A collection of tools for dealing with TrickBot☆198Updated 6 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated last year
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 12 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 6 years ago