ncatlin / lockwatcherLinks
Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.
☆29Updated 9 years ago
Alternatives and similar repositories for lockwatcher
Users that are interested in lockwatcher are comparing it to the libraries listed below
Sorting:
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- ☆16Updated 9 years ago
- Truehunter☆30Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- Collection of binaries and scripts found across the net☆20Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 14 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Updated 8 years ago