[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β13Jun 12, 2017Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- tamper resistant audit logβ17Aug 30, 2018Updated 7 years ago
- log file scrubberβ15Jul 27, 2018Updated 7 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)β18Mar 29, 2016Updated 9 years ago
- dnsoverhttps - D'oh!β14Sep 20, 2018Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Teamβ15Jul 21, 2019Updated 6 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.β11Nov 22, 2019Updated 6 years ago
- ποΈ WebShell Backdoor Frameworkβ16Jun 7, 2018Updated 7 years ago
- Analyse SQL injection attempts in web server logsβ82Jan 11, 2017Updated 9 years ago
- Enormously stupid programming language in swiss german.β10Mar 6, 2016Updated 10 years ago
- Parse Yara rules and operate over them more easily.β51Jan 7, 2019Updated 7 years ago
- A Android program help you learn English.β13Mar 18, 2024Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.β11Oct 29, 2018Updated 7 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption toolβ30May 29, 2018Updated 7 years ago
- Implementation of the ATProtocol client spec in Elixir.β17Nov 18, 2024Updated last year
- Nmap results are a semigroupβ13Jul 8, 2021Updated 4 years ago
- Kirjuri is a web application for managing cases and physical forensic evidence items.β107May 7, 2021Updated 4 years ago
- Scripts to automate Open Source Intelligence (OSINT)β15Mar 27, 2019Updated 6 years ago
- β11Jun 22, 2020Updated 5 years ago
- General repository for compiled and uncompiled EnCase EnScriptsβ46Mar 11, 2021Updated 5 years ago
- autoscan - automatic fingerprint of visited networksβ11Nov 2, 2013Updated 12 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.β11Feb 18, 2015Updated 11 years ago
- Twintelligence is a free Twitter OSINT toolβ51Dec 8, 2020Updated 5 years ago
- Security audit tool for Encrypt.toβ14May 2, 2015Updated 10 years ago
- Powershell Framework to make an USB auto-executable on infected machines.β36Feb 27, 2017Updated 9 years ago
- Automated Mass Exploiterβ11Apr 14, 2019Updated 6 years ago
- python tools to assist in penetration testingβ14Jan 19, 2026Updated 2 months ago
- XOR encryption CLI app written in Rustβ12Dec 23, 2018Updated 7 years ago
- The Linux Simulatorβ15Mar 23, 2023Updated 2 years ago
- Some RSA attacks with sageβ11Nov 15, 2016Updated 9 years ago
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.β15Jul 11, 2017Updated 8 years ago
- \ PowerAvails Powershell /β10Jun 30, 2018Updated 7 years ago
- Manga downloader based on tachiyomi extensionsβ10Apr 20, 2021Updated 4 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Webβ13Updated this week
- π€ Boilerplate for creating Telegram bots using Node.jsβ10Jun 20, 2017Updated 8 years ago
- A simple android library to retrieve shortened urls from Goo.glβ11Jan 25, 2016Updated 10 years ago
- εζγγΌγ«η΅ζγ·γΌγβ19Nov 13, 2017Updated 8 years ago
- β16May 4, 2017Updated 8 years ago
- DrayTek Vigor password recovery, config & firmware toolsβ11Jul 18, 2015Updated 10 years ago
- An OSINT tool to find data leaks on a targeted websiteβ17Mar 30, 2021Updated 4 years ago