jgamblin / arethesebad
Python script to check the hashes of files in a directory against virustotal.com
☆16Updated 9 years ago
Alternatives and similar repositories for arethesebad:
Users that are interested in arethesebad are comparing it to the libraries listed below
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- SlyPI☆18Updated 11 years ago
- Awesome little automater☆17Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- A curated list of tools for incident response☆28Updated 10 months ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Gets Reverse DNS, GeoIP, NMAP, Traceroute and pulls HTTP Headers for an IP address.☆21Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Search bing with python☆12Updated 10 years ago
- ☆19Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- Phishing Toolkit☆19Updated 6 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 10 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Updated 9 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago