int0x80 / anti-forensics
for the louise
☆242Updated 4 years ago
Alternatives and similar repositories for anti-forensics:
Users that are interested in anti-forensics are comparing it to the libraries listed below
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆331Updated 4 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 8 years ago
- ☆425Updated 7 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆37Updated 5 years ago
- A repository of tools and scripts related to malware analysis☆248Updated 8 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆382Updated 2 years ago
- Repo for autosnort scripts.☆157Updated 4 years ago
- ☆142Updated 8 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆139Updated 6 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- builds database/visualizations of LAN structure from passively sifted information☆147Updated 10 years ago
- Auto Installer Script for Cuckoo Sandbox☆165Updated 6 years ago