A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!
☆25Jan 8, 2026Updated 2 months ago
Alternatives and similar repositories for hstsparser
Users that are interested in hstsparser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- A quick reference guide for python script development in DFIR☆17Mar 20, 2024Updated 2 years ago
- A Forensic SQLite Database Analyser and Reporting Tool written in Python 2.7.☆15Aug 6, 2018Updated 7 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆18Nov 5, 2023Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆114May 19, 2023Updated 2 years ago
- Scenes from movies re-imagined as though there were in the terminal☆23Aug 10, 2017Updated 8 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- A guide to setting up Windows and MacOS the way I like it☆22Jun 25, 2025Updated 9 months ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Sep 25, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Productivity and analysis tools for online marketing☆10Aug 31, 2017Updated 8 years ago
- VBScript minifier☆25Mar 19, 2026Updated last week
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- ☆28Mar 31, 2023Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- This repository is a collection of EnScript code samples for use in the OpenText Endpoint Forensic and OpenText Endpoint Investigator app…☆54Jul 14, 2025Updated 8 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- a scaling framework for tor traffic balancing 🧦 🧅 ⚖️☆14Mar 17, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- spiders the bitcoin network and returns ip:port ipv4/ipv6☆13Jul 3, 2024Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Nov 25, 2022Updated 3 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- Check security aspects of a second-level domain name.☆18May 31, 2024Updated last year
- Share files of any size with Chirp and dat☆12Oct 5, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- tools and documentation for uConsole☆12Jul 29, 2023Updated 2 years ago
- Ground Penetrating Radar data processing and classification to detect buried objects in the ground☆16Jul 7, 2023Updated 2 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago