nlitsme / zipdumpLinks
Analyze zipfile, either local, or from url
☆38Updated last year
Alternatives and similar repositories for zipdump
Users that are interested in zipdump are comparing it to the libraries listed below
Sorting:
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- Registry timestamp manipulation☆17Updated 11 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- Data exfiltration and covert communication tool☆39Updated 3 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Extract files off NTFS☆22Updated 11 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- ☆26Updated 3 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- ☆17Updated 4 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆29Updated 9 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- A rogue DNS detector☆24Updated last month
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 6 years ago
- Yet another way to find where to report an abuse☆30Updated 11 months ago
- Digital Forensics date and time☆23Updated 2 weeks ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor☆34Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- ☆96Updated 3 months ago
- Local Privilege Escalation Miner☆31Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year