jonstewart / foremostLinks
Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourceforge.net/
☆53Updated 12 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below
Sorting:
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆144Updated 4 years ago
- hexadecimal & URL encoder + decoder☆75Updated 8 years ago
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆96Updated 2 months ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- berzerk0's GitHub Page☆47Updated 2 years ago
- Security tools report parsers for Faradaysec.com☆55Updated 2 weeks ago
- SNIcat☆128Updated 4 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆51Updated 4 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- A repository dedicated to terminal escape injections.☆67Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- A workshop on Packet Crafting using Scapy.☆159Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆99Updated last year
- ☆40Updated 10 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆44Updated 9 years ago
- Detect hidden files and text in images☆121Updated 2 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 5 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- bap - http Basic Authentication honeyPot☆51Updated 10 years ago
- Collection of useful scripts.☆78Updated 3 years ago
- PDFExaminer Tool - Analyse PDF Malware☆62Updated 4 years ago
- List of default passwords for Industrial Control Systems☆77Updated 8 years ago