it-forensics / forensics
Knowledge space for some computerforensic stuff
☆14Updated 10 years ago
Related projects: ⓘ
- Digital Forensics and Incident Response Wiki☆39Updated 10 years ago
- ☆23Updated this week
- ☆51Updated this week
- ☆37Updated this week
- In this project we made a web browser forensic tool which recover deleted history,cache and cookies of chorme and mozilla. The tool simpl…☆14Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 9 years ago
- Wi-Fi Backdoors☆34Updated 9 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 6 years ago
- ☆32Updated this week
- ☆15Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆30Updated 12 years ago
- ☆34Updated this week
- log file scrubber☆15Updated 6 years ago
- ☆17Updated this week
- Just a collection of scripts☆40Updated 4 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆28Updated 10 years ago
- Download exploits from exploit-db.com☆43Updated 9 years ago
- Hacking environment installation scripts for OS X☆26Updated 2 years ago
- ☆53Updated this week
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- repo with compromised keys and such☆18Updated last year
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- iOS forensics utility☆12Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- Wireless Forensics Framework In Python☆19Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆12Updated this week
- Security Advisories and Researches☆14Updated 10 years ago