it-forensics / forensicsLinks
Knowledge space for some computerforensic stuff
☆14Updated 10 years ago
Alternatives and similar repositories for forensics
Users that are interested in forensics are comparing it to the libraries listed below
Sorting:
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Just a collection of scripts☆40Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- In this project we made a web browser forensic tool which recover deleted history,cache and cookies of chorme and mozilla. The tool simpl…☆15Updated 10 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- See here:☆42Updated 12 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- CDDC Exploitation Framework☆13Updated 2 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- log file scrubber☆16Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago