[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β13Jun 12, 2017Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- tamper resistant audit logβ17Aug 30, 2018Updated 7 years ago
- log file scrubberβ15Jul 27, 2018Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Teamβ15Jul 21, 2019Updated 6 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.β11Nov 22, 2019Updated 6 years ago
- dnsoverhttps - D'oh!β14Sep 20, 2018Updated 7 years ago
- ποΈ WebShell Backdoor Frameworkβ16Jun 7, 2018Updated 7 years ago
- β17Apr 13, 2018Updated 7 years ago
- A modular pentesting framework implemented in Cβ13Aug 6, 2018Updated 7 years ago
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.β15Jul 11, 2017Updated 8 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)β18Mar 29, 2016Updated 9 years ago
- Become a Github Rockstar in less than 10 secondsβ19Mar 18, 2023Updated 2 years ago
- Sandboxie Python Clientβ24Jun 29, 2012Updated 13 years ago
- Python Time Based Authentication Attack Toolβ21Apr 20, 2021Updated 4 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption toolβ29May 29, 2018Updated 7 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.β33Jul 7, 2016Updated 9 years ago
- β13Jul 13, 2020Updated 5 years ago
- A python script to decrypt Cellebrite UFED EPR files.β34Mar 3, 2021Updated 4 years ago
- Powershell Framework to make an USB auto-executable on infected machines.β36Feb 27, 2017Updated 9 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)β11Feb 17, 2017Updated 9 years ago
- Just a single binary no config file Chromium(64bit) updater.β11May 5, 2018Updated 7 years ago
- Module to use a Minecraft Server through Metasploitβ10Oct 19, 2013Updated 12 years ago
- G-Surgeβ11Feb 7, 2018Updated 8 years ago
- Uma ferramenta WEB de seguranΓ§a open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.β10Mar 15, 2021Updated 4 years ago
- Steal user's password when running sudo for post-exploitation purposesβ44Sep 29, 2020Updated 5 years ago
- A small subset of the submitted sample data from https://github.com/GrapheneOS/Auditor. It has a sample attestation certificate chain perβ¦β38Jul 28, 2022Updated 3 years ago
- Fileless persistence, attacks and anti-forensic capabilties.β92Dec 6, 2018Updated 7 years ago
- BlackArch configuration for the bash shell.β13Jan 11, 2021Updated 5 years ago
- This python script can help you to detect what object is in moving.β12Nov 28, 2018Updated 7 years ago
- Knowledge space for some computerforensic stuffβ14Aug 15, 2014Updated 11 years ago
- Cryptographic Asymmetric Secure Storage Infrastructureβ10Jan 6, 2023Updated 3 years ago
- Bot software for creating Wikipedia articles using geographical dataβ10Feb 28, 2017Updated 9 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank cardβ15Oct 25, 2017Updated 8 years ago
- An image steganography with high embedding capacity based on a genetic algorithmβ11Nov 9, 2019Updated 6 years ago
- Data Commander is a front-end for SQL and other databases. The program has a plugin architecture for adding arbitrary data providers.β11Updated this week
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Webβ13Feb 23, 2026Updated last week
- β11Jul 10, 2024Updated last year
- IP kung-FUβ10Mar 14, 2019Updated 6 years ago
- A Android program help you learn English.β13Mar 18, 2024Updated last year
- DEPRECATED: Element Hiding Helper extension for Adblock Plusβ11Dec 1, 2017Updated 8 years ago