sefcom / dbling
dbling: The Chrome OS Forensic Toolset
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for dbling
- This package allows reading and writing bettercap's session recordings.☆15Updated 5 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆23Updated 2 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Updated 6 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 8 years ago
- personal fork of OSINT tool recon-ng☆16Updated 6 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆18Updated 6 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 6 years ago
- Detect credit card exposures with Bro☆15Updated last year
- ☆24Updated 2 years ago
- Network white noise collector☆18Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- Test Suite for John the Ripper☆24Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 4 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- ☆24Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 5 months ago
- Fun with Amazon AWS and Maltego☆28Updated 7 years ago
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 9 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- Architecture - design and implementation of the D4 project architecture☆16Updated 3 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- medium interaction postgresql honeypot☆11Updated 3 months ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago