Wireless Forensics Framework In Python
☆19Jan 29, 2017Updated 9 years ago
Alternatives and similar repositories for Wireless-forensics-framework
Users that are interested in Wireless-forensics-framework are comparing it to the libraries listed below
Sorting:
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- A curated list of digital forensic tools.☆21Dec 2, 2019Updated 6 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Digital Forensics with Kali Linux, published by Packt☆101Jan 30, 2023Updated 3 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆18Sep 27, 2018Updated 7 years ago
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Hybrid client emulator (python and C++) for Metin2.☆19Oct 14, 2016Updated 9 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- ☆33Nov 21, 2024Updated last year
- Bypassing Android Pattern Lock☆69Apr 16, 2014Updated 11 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 4 months ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Aug 2, 2013Updated 12 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Learning Python for Forensics by Packt Publishing☆125Jan 30, 2023Updated 3 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Devploit v 1.1 Information Gathering Tool☆33Dec 12, 2017Updated 8 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- A collection of anti-forensics scripts☆29Oct 19, 2025Updated 4 months ago
- ☆13Aug 28, 2025Updated 6 months ago
- TRIGGER ARCHITECTURE FRAMEWORK RECIPE☆12Apr 14, 2020Updated 5 years ago