A network logging tool that logs per process activities
☆32Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for NetDahar
Users that are interested in NetDahar are comparing it to the libraries listed below
Sorting:
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆18Sep 10, 2025Updated 5 months ago
- YouTube History Analyzer☆37Jan 31, 2026Updated last month
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- ☆34May 24, 2023Updated 2 years ago
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆15Nov 21, 2025Updated 3 months ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆19Apr 30, 2025Updated 10 months ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- Reaper of screencast videos for OSINT purposes☆20Apr 12, 2024Updated last year
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- Решения различных OSINT-задач / OSINT tasks writeups in Russian☆18Apr 26, 2024Updated last year
- dynamic YAML-driven URL shortener and command mapper with real-time config updates☆20Aug 28, 2025Updated 6 months ago
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆37Jul 4, 2025Updated 7 months ago
- Tor VPN☆27Updated this week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- ⚔️ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.☆27Apr 28, 2025Updated 10 months ago
- ☆25Feb 11, 2024Updated 2 years ago
- Tools for OSINT in Emirates☆25Apr 13, 2025Updated 10 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 7 months ago
- Atlantic: Automated Data Preprocessing Framework for Machine Learning☆32Feb 2, 2026Updated last month
- Real-time tracking of Steam players activities☆35Feb 7, 2026Updated 3 weeks ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆33Aug 26, 2022Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- ☆34Jun 13, 2023Updated 2 years ago
- Track GitHub user and repository activity in real time with instant notifications☆44Feb 7, 2026Updated 3 weeks ago
- General Content☆25Dec 23, 2025Updated 2 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- ☆61Jun 24, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Jun 28, 2025Updated 8 months ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Mar 7, 2023Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated 11 months ago
- Nmap NSE scripts☆27Feb 1, 2022Updated 4 years ago