sandy9999 / Sih_Rk312_winterfellLinks
Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & Column Structure) file format. Desired Solution: The solution should take different input file formats like .XLSX, .CSV, TXT. and it shall convert into Info Graphical and Data Visualizer forms with connected R…
☆13Updated 4 years ago
Alternatives and similar repositories for Sih_Rk312_winterfell
Users that are interested in Sih_Rk312_winterfell are comparing it to the libraries listed below
Sorting:
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- ☆33Updated 6 months ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- The Advanced Automated Pentesting And Forensics Tool☆26Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Fraud prevention tool☆28Updated 4 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Proof of Concept OSINT visualization☆12Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Various components we use in labs☆10Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆17Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆64Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago