sch3m4 / wforensic
User-friendly DJango project to data interpretation and chart of messages activity from WhatsApp records.
☆66Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for wforensic
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆42Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 9 years ago
- Resources for HFS+ Forensics☆35Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 5 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆50Updated 6 years ago
- ADB Based Acquisition Tool for Android Forensics☆40Updated 3 years ago
- ☆26Updated 3 years ago
- Transparent network tap☆116Updated 9 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆38Updated 6 years ago
- Maltego Local Transforms for Facebook☆68Updated 6 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆55Updated 9 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Updated 7 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 7 years ago
- recover deleted information from sqlite files.☆62Updated 8 years ago
- A script to mine SQLite databases for hidden gems that might be overlooked☆53Updated 4 years ago
- RuraSort - A utility to sort and streamline wordlists.☆28Updated 4 years ago
- Android Data Extractor Lite☆128Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- This program show you IMSI numbers of cellphones around you.☆14Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Updated 11 years ago
- Megatron - A System for Abuse- and Incident Handling☆41Updated 7 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago