numirias / firefedLinks
🕵️ A tool for Firefox profile analysis, data extraction, forensics and hardening
☆105Updated 3 years ago
Alternatives and similar repositories for firefed
Users that are interested in firefed are comparing it to the libraries listed below
Sorting:
- Run several volatility plugins at the same time☆117Updated 3 years ago
- A CLI tool to identify the hash type of a given hash.☆113Updated 3 years ago
- Tools for investigating Log4j CVE-2021-44228☆94Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆143Updated last month
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- List of Repositories☆102Updated 4 years ago
- A repository dedicated to terminal escape injections.☆67Updated 5 years ago
- PDFExaminer Tool - Analyse PDF Malware☆64Updated 4 years ago
- SNIcat☆128Updated 4 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Updated 2 years ago
- A modern Python-3-based alternative to RegRipper☆204Updated 10 months ago
- ☆53Updated 2 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆134Updated 2 weeks ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- Extract credentials and other useful info from network captures☆76Updated 3 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Immediate Virus Infection Counter Measures☆63Updated 4 years ago
- ☆151Updated last year
- Qubes containerization on Windows☆130Updated 4 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- A Python API for Hack the Box platform interaction☆64Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆36Updated 5 years ago
- Docker build for autopsy☆21Updated 4 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Updated last year
- ☆90Updated last month
- BloodHound Docker Ready to Use☆91Updated 2 years ago