thereisnotime / xxUSBSentinelLinks
Windows anti-forensics USB monitoring tool.
☆69Updated 2 years ago
Alternatives and similar repositories for xxUSBSentinel
Users that are interested in xxUSBSentinel are comparing it to the libraries listed below
Sorting:
- Extracts Windows user info including the password hashes☆40Updated 9 years ago
- ☆53Updated 4 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆80Updated last year
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Custom pentesting tools☆26Updated 5 years ago
- ☆25Updated 2 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Updated 8 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 11 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆67Updated 4 years ago
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆56Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated this week
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago