simeononsecurity / FireFox-Security-Researcher
Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.
☆16Updated 9 months ago
Alternatives and similar repositories for FireFox-Security-Researcher
Users that are interested in FireFox-Security-Researcher are comparing it to the libraries listed below
Sorting:
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- ☆28Updated last year
- Capture screenshots of onion services on an onion service.☆48Updated 11 months ago
- Terminal based fake identity generator.☆26Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- Tool for extracting credentials locally stored by web browsers☆31Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Tool for scanning domains for .git directories.☆16Updated last year
- ☆14Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- quick and dirty proof-of-concept to hide shells in images☆50Updated 10 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year