A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!
☆25Jan 8, 2026Updated last month
Alternatives and similar repositories for hstsparser
Users that are interested in hstsparser are comparing it to the libraries listed below
Sorting:
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆114May 19, 2023Updated 2 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- Scenes from movies re-imagined as though there were in the terminal☆23Aug 10, 2017Updated 8 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Sep 25, 2018Updated 7 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- This repository is a collection of EnScript code samples for use in the OpenText Endpoint Forensic and OpenText Endpoint Investigator app…☆54Jul 14, 2025Updated 7 months ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Nov 25, 2022Updated 3 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- ☆33Aug 29, 2022Updated 3 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- Ground Penetrating Radar data processing and classification to detect buried objects in the ground☆14Jul 7, 2023Updated 2 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆35Feb 1, 2022Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- It is based on bulk_extractor (https://github.com/simsong/bulk_extractor) and add scanners for record carving☆42Apr 23, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A tool to detect who's cutting the internet on your network☆13Apr 30, 2020Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Ded Security Framework is a tool aimed at security professionals☆35May 12, 2024Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago