A tool designed to correlate evidence obtained from IoT devices
☆11Nov 6, 2020Updated 5 years ago
Alternatives and similar repositories for Stitcher
Users that are interested in Stitcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Code for "Astraea: Grammar-based Fairness Testing"☆10Jan 7, 2022Updated 4 years ago
- Joins on Mongo☆14May 8, 2016Updated 9 years ago
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- Reject membrane, embrace monke☆10Jan 7, 2022Updated 4 years ago
- 💬 Data forensics and recovery utility for Skype chats and history☆12Oct 29, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- 根据分享链接获取抖音,小红书,B站的用户昵称和粉丝数☆10Nov 3, 2020Updated 5 years ago
- Public Repo for the source code of the UDCTF in 2022☆12Nov 7, 2022Updated 3 years ago
- 📌 An interdisciplinary team project of the course Software Lab at Technical University of Munich (TUM), aiming to map WiFi signals to in…☆15Jan 30, 2022Updated 4 years ago
- my goto docker image when playing ctfs with all the tools I need☆21Mar 8, 2026Updated 2 weeks ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- This is a repository for discussing Roles Based Access Control for docker☆19Jul 27, 2015Updated 10 years ago
- The first and only (for now) Bulgarian OSINT tools list.☆22Mar 12, 2024Updated 2 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Jun 4, 2017Updated 8 years ago
- HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.☆19Aug 28, 2021Updated 4 years ago
- fragments image and re-assemble them back to original image. #Prim's MST algorithm☆25Oct 20, 2025Updated 5 months ago
- GreyCTF 2022 challenge source and solution☆17Jun 24, 2022Updated 3 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- ☆31Jan 17, 2026Updated 2 months ago
- dock try to re-implement docker 🐳☆33Nov 28, 2018Updated 7 years ago
- Extract text, image, audio, and video info from WeChat SQLite db and user content folder, generate WeChat style HTML5 files.☆23Aug 30, 2015Updated 10 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Jul 10, 2020Updated 5 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- ☆44Aug 25, 2017Updated 8 years ago
- appieSniper is a python program to get notifications on overblijvers at nearby Albert Heijn supermarkets, this way you can claim you pack…☆11Jun 10, 2025Updated 9 months ago
- Generates Wireguard configuration files☆15Jul 26, 2022Updated 3 years ago
- 在线cms识别|旁站|c段|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..☆10Apr 23, 2019Updated 6 years ago
- The Go Language Implementation of Ontology Actor Model☆25May 25, 2021Updated 4 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆29Aug 20, 2024Updated last year