simeononsecurity / FireFox-Security-ResearcherLinks
Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.
☆16Updated last year
Alternatives and similar repositories for FireFox-Security-Researcher
Users that are interested in FireFox-Security-Researcher are comparing it to the libraries listed below
Sorting:
- Enumeration & fingerprint tool☆24Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated last month
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆38Updated this week
- A Red Teaming tool focused on profiling the target.☆29Updated 5 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆36Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- ☆79Updated last year
- Simple Shellcode Runner in Rust Language☆18Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆55Updated last year