ncatlin / lockwatcherLinks
Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.
☆30Updated 9 years ago
Alternatives and similar repositories for lockwatcher
Users that are interested in lockwatcher are comparing it to the libraries listed below
Sorting:
- Truehunter☆31Updated 4 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated last year
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 6 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- ☆15Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆76Updated 5 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago