rezaduty / awesome-forensics-1
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-forensics-1
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆21Updated 5 years ago
- ☆18Updated 6 years ago
- ☆17Updated 7 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆35Updated 9 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆24Updated 11 months ago
- Simulate Windows EXE for Malware Research!☆18Updated 2 months ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆14Updated last year
- Unauthorized Docker Exploitation Tool☆35Updated 10 months ago
- GZIP 页面零开销注入 JS 演示☆15Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆62Updated 7 months ago
- Kali Packerge Manager☆50Updated last year
- A testing Red Team Infrastructure created with Docker☆32Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆15Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Updated 9 months ago
- ASUS wifi router RCE vulnerability☆14Updated 2 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆93Updated last year
- Memory Scaner☆62Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆9Updated 5 months ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆24Updated 3 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆52Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆14Updated 11 months ago
- ☆19Updated 4 months ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆31Updated 10 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- Keygen for Positive Technologies Network Attack Detector☆19Updated 11 months ago