moxilo / mac-osx-forensicsLinks
Mac osx forensics tools
☆11Updated 5 years ago
Alternatives and similar repositories for mac-osx-forensics
Users that are interested in mac-osx-forensics are comparing it to the libraries listed below
Sorting:
- A curated list of tools for incident response☆34Updated last year
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Basic file metadata gathering script☆21Updated 8 months ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Updated 10 years ago
- A series of Bro Scripts created for detection purposes.☆19Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Phishing Toolkit☆19Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- ☆30Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- HoneyDB Python Module☆14Updated last year
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 15 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- ☆23Updated 11 years ago