naemazam / logForenix
log Forenix π΅οΈ- Your Linux Forensic Artifacts Collector Tool! π
β31Updated 8 months ago
Alternatives and similar repositories for logForenix:
Users that are interested in logForenix are comparing it to the libraries listed below
- SubnetWizard is a Python Based CLI tools for subnet calculatingβ50Updated 10 months ago
- EncryptXpert is an app for easy file encryption/decryption using AES-EAX or AES-GCM algorithms. With GUI & CLI support and Build-in Key Dβ¦β55Updated 11 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ29Updated 9 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and eβ¦β13Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Inβ¦β49Updated 2 weeks ago
- β21Updated 2 years ago
- Cybersecurity Career Pathβ11Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β40Updated 7 months ago
- β36Updated 2 months ago
- Hacking with PasteJacking techniqueβ21Updated 8 months ago
- Tool for automate bug hunting process π --> πβ33Updated 6 months ago
- PassBreakerβ58Updated 10 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β53Updated 2 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β74Updated 5 months ago
- π΅οΈ Email osint toolβ62Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS attaβ¦β111Updated 9 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam processβ24Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefuβ¦β16Updated 9 months ago
- Tool for bypassing logins vulnerable against SQL injectionβ44Updated 11 months ago
- A Simple RedLineStealerβ12Updated last year
- πͺ XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XSβ¦β50Updated 2 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-devβ20Updated last year
- This is a working variant of the Mirai IOT botnetβ13Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Enginβ¦β17Updated 3 years ago
- β19Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.β53Updated 6 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with pocβ20Updated 3 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacyβ¦β12Updated 2 months ago
- Discovering Typo Squatting on your domains!β65Updated 7 months ago
- Top 400 passwords as per HaveIBeenPwnedβ21Updated 4 months ago