sch3m4 / wforensic
User-friendly DJango project to data interpretation and chart of messages activity from WhatsApp records.
☆66Updated 9 years ago
Alternatives and similar repositories for wforensic:
Users that are interested in wforensic are comparing it to the libraries listed below
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆50Updated 6 years ago
- WhatsApp Key/DB Extractor [UnOfficial]☆100Updated 7 years ago
- WhatsApp forensics analysis and acquisition utility☆24Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 5 years ago
- VAPT is a Vulnerability Assessment and Penetration Testing toolkit -- a small collection of some of the common testing tools specifically…☆28Updated 2 months ago
- A Gmail credential harvester☆11Updated 7 months ago
- Maltego Local Transforms for Facebook☆70Updated 7 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Updated 7 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆45Updated 9 years ago
- ☆19Updated 9 years ago
- playing around with food and drink sites and OSINT☆14Updated 6 years ago
- A simple powershell script that removes a lot of Windows 10's more unnecessary, annoying, or invasive components.☆23Updated 8 years ago
- Rapid7's Nexpose Maltego Transform Pack☆24Updated 11 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 9 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆67Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Machines created to speed up analysis inside of Maltego☆16Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 6 years ago
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆48Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago