Batch scripts to capture volatile and log information from a target system
☆21Oct 9, 2014Updated 11 years ago
Alternatives and similar repositories for Tr3Secure
Users that are interested in Tr3Secure are comparing it to the libraries listed below
Sorting:
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- A Lightweight Malware Configuration Parsing Tool☆15Nov 6, 2019Updated 6 years ago
- Python Module for parsing Apple ASL Logs☆15Apr 7, 2016Updated 9 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆11Oct 4, 2017Updated 8 years ago
- ☆12Mar 7, 2020Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Parse Manifest.mbdb files from iTunes backup directories☆20Jun 29, 2017Updated 8 years ago
- Autoruns plugin for the Volatility framework☆123Jul 18, 2019Updated 6 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 11 months ago
- Plugins I've written for Volatility☆216Dec 1, 2023Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/mac-osx-forensics☆28Jan 12, 2016Updated 10 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- ☆11Feb 25, 2026Updated 3 weeks ago
- Web Footprinting Tool☆21Jan 27, 2019Updated 7 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- APK For Dumping Memory libil2cpp.so / libUE4.so from memory☆15Sep 3, 2021Updated 4 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- ☆24Aug 30, 2019Updated 6 years ago
- Visualization of interaction between entities☆16Nov 28, 2016Updated 9 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 11 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago