rezaduty / awesome-forensics-1Links
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
☆14Updated 5 years ago
Alternatives and similar repositories for awesome-forensics-1
Users that are interested in awesome-forensics-1 are comparing it to the libraries listed below
Sorting:
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆21Updated 5 years ago
- ☆19Updated 6 years ago
- Rapidly initialize Windows Sandbox for malware analysis and reverse engineering☆142Updated 7 months ago
- ☆17Updated 8 years ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369Updated 2 years ago
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆335Updated 7 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Updated 2 years ago
- A Linux persistence tool!☆156Updated last week
- Stable version of Unhide☆173Updated last month
- 局域网逻辑隔离系统,防局域网0day攻击。☆24Updated 3 months ago
- ☆313Updated 3 years ago
- ☆14Updated 2 weeks ago
- D-Link NAS CVE-2024-3273 Exploit Tool☆104Updated last year
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆63Updated last month
- ☆11Updated 11 months ago
- ☆95Updated last year
- Windows And Ways To Break It☆99Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Lockbit, URSIF, BlackBasta etc.☆134Updated 4 months ago
- Brute force cracking the compressed package | 暴力破解有密码的压缩包☆34Updated last year
- 🔫 lkm module for emergency binary/script execution☆14Updated 7 years ago
- A GUI offline OCR tool for searching scanned PDF documents on a per-page basis, prioritizing accessibility, privacy, and user experience …☆100Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆81Updated 7 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- Memory Scaner☆63Updated 3 years ago
- ☆45Updated 3 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- Volatility Explorer Suit☆66Updated 2 years ago
- gRPC client for the Merlin Server☆23Updated 5 months ago
- ☆57Updated 2 years ago