naemazam / logForenix
log Forenix π΅οΈ- Your Linux Forensic Artifacts Collector Tool! π
β31Updated 4 months ago
Related projects β
Alternatives and complementary repositories for logForenix
- SubnetWizard is a Python Based CLI tools for subnet calculatingβ49Updated 7 months ago
- EncryptXpert is an app for easy file encryption/decryption using AES-EAX or AES-GCM algorithms. With GUI & CLI support and Build-in Key Dβ¦β54Updated 7 months ago
- Top 400 passwords as per HaveIBeenPwnedβ20Updated 3 weeks ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ24Updated 5 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.β24Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.β18Updated 5 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!β39Updated 2 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable β¦β19Updated 3 weeks ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from targetβ28Updated 3 months ago
- This is an AD pentest tools collectionβ53Updated 4 months ago
- Subdomains scanner Spiderβ13Updated 8 months ago
- Script related in Active Directory Attacks Domainβ21Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.β15Updated this week
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.β13Updated 2 months ago
- β20Updated 3 weeks ago
- Tool for bypassing logins vulnerable against SQL injectionβ43Updated 7 months ago
- π΅οΈ Email osint toolβ60Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and eβ¦β11Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]β31Updated 5 months ago
- β58Updated 6 months ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etcβ23Updated 3 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eveβ¦β37Updated last week
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β52Updated 4 months ago
- Discovering Typo Squatting on your domains!β59Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.β46Updated last month
- SSH & FTP brute-forcing tool written in pythonβ11Updated last month
- Tool for automate bug hunting process π --> πβ33Updated 3 months ago
- XML-RPC Vulnerability Checker and Directory Fuzzerβ23Updated last year
- MS Graph Commands and Tools for Blue Teamersβ48Updated 11 months ago
- β32Updated 2 weeks ago