thebeanogamer / hstsparserView external linksLinks
A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!
☆25Jan 8, 2026Updated last month
Alternatives and similar repositories for hstsparser
Users that are interested in hstsparser are comparing it to the libraries listed below
Sorting:
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Apr 24, 2023Updated 2 years ago
- ☆20Jan 2, 2026Updated last month
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112May 19, 2023Updated 2 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Sep 25, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- This repository is a collection of EnScript code samples for use in the OpenText Endpoint Forensic and OpenText Endpoint Investigator app…☆54Jul 14, 2025Updated 6 months ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆178Nov 25, 2022Updated 3 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- Modules for my C2 course students to use for their own projects.☆74Jun 13, 2023Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found somethin…☆34Jan 26, 2025Updated last year
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆36Feb 1, 2022Updated 4 years ago
- It is based on bulk_extractor (https://github.com/simsong/bulk_extractor) and add scanners for record carving☆42Apr 23, 2020Updated 5 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- Telegram base free Rat☆11Apr 26, 2025Updated 9 months ago
- Skillets is the default holding place for useful Panhandler skillets. These are usually smaller one-off bits that may not require their o…☆13Apr 15, 2020Updated 5 years ago
- Ded Security Framework is a tool aimed at security professionals☆35May 12, 2024Updated last year
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆111Feb 3, 2026Updated last week
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago