jonstewart / foremostLinks
Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourceforge.net/
☆54Updated 12 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below
Sorting:
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆94Updated 4 months ago
- Security tools report parsers for Faradaysec.com☆54Updated last month
- Bash script to bruteforce snmpv3 authentication passwords using MD5 (usmHMACMD5AuthProtocol)☆31Updated 6 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- My pen testing notes☆52Updated 2 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- SNIcat☆126Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Cervantes plataform docker repository☆13Updated 3 months ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- A repository dedicated to terminal escape injections.☆66Updated 5 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆98Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆16Updated 2 years ago
- isodump - ISO dump utility☆40Updated 6 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Updated 6 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- ☆39Updated 10 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago