pwnwiki / dfirwikiView external linksLinks
Digital Forensics and Incident Response Wiki
☆40May 19, 2014Updated 11 years ago
Alternatives and similar repositories for dfirwiki
Users that are interested in dfirwiki are comparing it to the libraries listed below
Sorting:
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 10 years ago
- Unofficial Kali Documentation Project☆159Feb 27, 2015Updated 10 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Aug 12, 2014Updated 11 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 10 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated last month
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 10 years ago
- Bypassing Android Pattern Lock☆69Apr 16, 2014Updated 11 years ago
- PwnWiki - The notes section of the pentesters mind.☆565Oct 22, 2018Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 14 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆11May 28, 2022Updated 3 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 10 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 5 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago