jonstewart / foremost
Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourceforge.net/
☆53Updated 12 years ago
Alternatives and similar repositories for foremost:
Users that are interested in foremost are comparing it to the libraries listed below
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆37Updated 4 months ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.☆42Updated 2 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A repository dedicated to terminal escape injections.☆66Updated 5 years ago
- ☆16Updated 6 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Python application to decrypt Netscaler Load Balancer Persistence Cookies☆44Updated last year
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 4 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆14Updated 5 years ago
- Detecting and decoding BIGIP cookies in bash☆32Updated 6 months ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- Security tools report parsers for Faradaysec.com☆53Updated last month
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆36Updated last month
- ☆44Updated 7 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Anonymize your hashcat formatted files for online cracking☆29Updated 6 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago