Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourceforge.net/
☆53Jan 10, 2013Updated 13 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- An FS wrapper that keeps all access scoped to a specific folder.☆14Dec 29, 2022Updated 3 years ago
- A simple Python-based port scanner that allows you to scan open ports on a specified IPv4 address within a given port range. The scanner …☆12Aug 22, 2023Updated 2 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- ☆20May 30, 2025Updated 9 months ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- CTF Write-ups☆25Mar 13, 2017Updated 9 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆31Jan 9, 2025Updated last year
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 5 years ago
- PhonePe PHP Merchant Client Library☆10Apr 26, 2017Updated 8 years ago
- ☆11Jun 19, 2024Updated last year
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits☆13Aug 22, 2019Updated 6 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- ART with modifications for Xposed☆13Sep 4, 2016Updated 9 years ago
- Lua Extension for Windbg☆21Oct 22, 2018Updated 7 years ago
- Unlock password encryption in PDF☆11Aug 16, 2019Updated 6 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- ☆16Updated this week
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- A tool to make it easier to change the SMALI of an APK☆11Mar 23, 2017Updated 9 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆144Dec 9, 2025Updated 3 months ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 9 years ago
- a tiny tool for swf hacking, just browse it:)☆13Mar 12, 2013Updated 13 years ago