it-forensics / forensicsLinks
Knowledge space for some computerforensic stuff
☆14Updated 11 years ago
Alternatives and similar repositories for forensics
Users that are interested in forensics are comparing it to the libraries listed below
Sorting:
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
 - my little bucket to store the delusions of grandeur I write in python :D☆30Updated 11 years ago
 - Just a collection of scripts☆40Updated 5 years ago
 - Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
 - A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
 - A short and small memory forensics helper.☆52Updated 8 years ago
 - Password cracking utility☆53Updated 4 years ago
 - log file scrubber☆16Updated 7 years ago
 - Wireless Forensics Framework In Python☆20Updated 8 years ago
 - A python script for obfuscating wireless networks☆79Updated 8 years ago
 - The Swiss army knife of byte manipulation☆43Updated 9 years ago
 - A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
 - HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆22Updated 8 years ago
 - Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
 - Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
 - NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
 - For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
 - Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
 - cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
 - My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 7 months ago
 - Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
 - [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
 - Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
 - ☆17Updated 8 years ago
 - Download exploits from exploit-db.com☆46Updated 10 years ago
 - Wi-Fi Backdoors☆39Updated 10 years ago
 - Post-Exploitation Framework☆78Updated 8 years ago
 - LIFARS Networking Security GNU/Linux distro☆27Updated 7 years ago
 - A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
 - In this project we made a web browser forensic tool which recover deleted history,cache and cookies of chorme and mozilla. The tool simpl…☆16Updated 10 years ago