sn0b4ll / aria2-onion-downloader
Download from .onion-domains faster.
☆182Updated 3 months ago
Alternatives and similar repositories for aria2-onion-downloader:
Users that are interested in aria2-onion-downloader are comparing it to the libraries listed below
- Yet another Ransomware gang tracker☆366Updated this week
- Collection of links on bad opsec☆90Updated 8 months ago
- A repository of credential stealer formats☆172Updated last week
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆150Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆296Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆136Updated 4 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆173Updated this week
- A GUI and CLI tool for removing bloat from executables☆374Updated 3 weeks ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆402Updated 7 months ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆286Updated last year
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆295Updated this week
- Nuke It From Orbit - remove AV/EDR with physical access☆251Updated last month
- A list of public attacks on BitLocker☆249Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆190Updated 3 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 10 months ago
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- Download utility for Tor☆45Updated last year
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆72Updated 3 years ago
- A centralized and enhanced memory analysis platform☆423Updated this week
- Just some lists of Malware Configs☆168Updated 3 weeks ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆261Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆339Updated 9 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆316Updated last week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆114Updated last month
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆13Updated 2 months ago
- FIT is a Python3 application for forensic acquisition of contents like web pages, emails, social media, etc. directly from the internet.☆73Updated last week
- ☆323Updated this week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆308Updated 5 months ago