sandy9999 / Sih_Rk312_winterfellLinks
Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & Column Structure) file format. Desired Solution: The solution should take different input file formats like .XLSX, .CSV, TXT. and it shall convert into Info Graphical and Data Visualizer forms with connected R…
☆16Updated 5 years ago
Alternatives and similar repositories for Sih_Rk312_winterfell
Users that are interested in Sih_Rk312_winterfell are comparing it to the libraries listed below
Sorting:
- Hashes of infamous malware☆26Updated 2 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28Updated last year
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆55Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆67Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- ☆33Updated 10 months ago
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Simple Malware Scanner written in python☆91Updated 7 months ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 4 years ago
- Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who…☆33Updated 5 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Updated 6 years ago
- ☆15Updated 7 years ago
- Low Interaction Mobile Honeypot☆96Updated 6 months ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- A script to create and assign SOP tasks into the cases☆21Updated 5 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Updated 4 years ago