simeononsecurity / FireFox-Security-ResearcherLinks
Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.
☆16Updated last year
Alternatives and similar repositories for FireFox-Security-Researcher
Users that are interested in FireFox-Security-Researcher are comparing it to the libraries listed below
Sorting:
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆13Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- masscan with exclusive excludes☆58Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Ransomware groups posts☆40Updated last week
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆32Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- ☆28Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆32Updated 2 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Fetch information about a public Google document.☆13Updated 2 years ago