WhatsApp forensics analysis and acquisition utility
☆26Apr 2, 2013Updated 12 years ago
Alternatives and similar repositories for WhatForensics
Users that are interested in WhatForensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- WhatsApp Forensic Tool☆175Jul 15, 2020Updated 5 years ago
- Logs Forensic Investigator SSH☆14Oct 27, 2018Updated 7 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆31Jan 12, 2014Updated 12 years ago
- Setup an evil Access Point with powerful MITMf.☆17Nov 26, 2016Updated 9 years ago
- Some useful tools for a iOS Forensics.☆37Jan 6, 2019Updated 7 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- Instagram crawler that utilizes a private API of Instagram. No developer account required.☆16Jun 3, 2018Updated 7 years ago
- AN ADVANCED PHISHING TOOL WITH MULTIPLE FUNCTIONALITY☆17Sep 23, 2018Updated 7 years ago
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- ☆32Jun 10, 2020Updated 5 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- ☆25Dec 4, 2019Updated 6 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Track yourself with "find my iPhone" - idea by http://www.leumund.ch/spy-myself-mit-find-my-iphone-0019390☆28Oct 26, 2013Updated 12 years ago
- ☆34Jul 16, 2020Updated 5 years ago
- Python based script for Information Gathering.☆105Jan 13, 2026Updated 2 months ago
- An open source framework for computer forensics☆61Jun 25, 2024Updated last year
- Automating Jenkins Hacking using Shodan API☆94Mar 24, 2018Updated 7 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Dec 8, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- PewCrypt Ransomware Source☆59Mar 22, 2019Updated 7 years ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆29Sep 1, 2023Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- A standalone addon for GnuPG☆18Nov 25, 2018Updated 7 years ago
- Windows Reverse TCP backdoor☆28Apr 28, 2019Updated 6 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- e-Democracia source code. http://edemocracia.camara.leg.br/ See our plans for the future on Trello: https://trello.com/b/Wzi39aNt/e-democ…☆10Feb 27, 2018Updated 8 years ago
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.☆13May 19, 2016Updated 9 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Mar 17, 2021Updated 5 years ago
- Get the urls for all disclosed vulnerabilities☆17Dec 29, 2015Updated 10 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- JWT Attack to change the algorithm RS256 to HS256☆34May 8, 2023Updated 2 years ago