joswr1ght / bitfitView external linksLinks
Recursively validate a starting directory of file contents to identify changes, corrupt data
☆37Jul 28, 2020Updated 5 years ago
Alternatives and similar repositories for bitfit
Users that are interested in bitfit are comparing it to the libraries listed below
Sorting:
- ☆12Dec 7, 2022Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 5 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆28Apr 4, 2025Updated 10 months ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆19Nov 14, 2019Updated 6 years ago
- Convert TI SmartRF Bluetooth Low Energy Packet Captures to Libpcap Format☆18Dec 11, 2014Updated 11 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 7 years ago
- Scapy packet fragment reassembly engines☆35Jan 24, 2021Updated 5 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- Let's obscure some IPv4 addresses☆39Nov 4, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 2 years ago
- Chrome app for Laverna☆15Feb 28, 2014Updated 11 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Open source code for use with Hunchly.☆10May 28, 2018Updated 7 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- ☆17Jun 25, 2024Updated last year
- Wrap any binary into a cached webserver☆57Apr 5, 2022Updated 3 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- no longer maintained☆18Feb 22, 2018Updated 7 years ago
- ☆21Apr 12, 2025Updated 10 months ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Read a plist file, write out any embedded plist files☆36Dec 27, 2015Updated 10 years ago
- Create Password lists for cracking lyrical passwords☆17May 11, 2024Updated last year
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- ☆196May 23, 2024Updated last year
- Digital Forensic Investigative Scripts☆87Feb 6, 2026Updated last week
- Firefox extension for Laverna☆15Apr 29, 2017Updated 8 years ago
- Library of functions to apply Data Science in several forensics artifacts☆40Aug 19, 2024Updated last year
- Configuration files for the SOF-ELK VM☆1,715Jan 21, 2026Updated 3 weeks ago