kraftdenker / ZAPiXDESKLinks
WhatsApp Desktop Live Forensics - Decryption&Extraction Technique
☆41Updated 6 months ago
Alternatives and similar repositories for ZAPiXDESK
Users that are interested in ZAPiXDESK are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆387Updated 2 months ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆103Updated last month
- ☆70Updated 9 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆147Updated 2 months ago
- Python tool to check rootkits in Windows kernel☆201Updated 2 months ago
- ☆114Updated 3 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆60Updated 2 years ago
- ☆39Updated 10 months ago
- A utility to process the iOS Cache.sqlite database and create a timelined KML map for use in Google Earth☆29Updated 11 months ago
- Extract files from Apple devices on Windows, Linux and MacOS. Mostly a wrapper for pymobiledevice3. Creates iTunes-style backups and "adv…☆307Updated last week
- ☆79Updated 3 years ago
- Dump quarantined files from Windows Defender☆67Updated 3 years ago
- This repository contains a few leaked files of HookBot.☆107Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated last month
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆75Updated 3 years ago
- Diana Credential Recovery Framework☆63Updated last month
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆47Updated last year
- A curated list of iOS Forensics References, organized by folder with specific references (links to blog post, research paper, articles, a…☆227Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆267Updated 10 months ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆53Updated this week
- ☆132Updated 2 years ago
- Configuration Extractors for Malware☆117Updated 6 months ago
- ☆49Updated 8 months ago
- ☆32Updated 6 months ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆406Updated 9 months ago
- Powershell Linter☆84Updated last week
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆31Updated 4 months ago
- Memory acquisition for Linux that makes sense.☆211Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆136Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago