thereisnotime / xxUSBSentinelLinks
Windows anti-forensics USB monitoring tool.
☆71Updated 2 years ago
Alternatives and similar repositories for xxUSBSentinel
Users that are interested in xxUSBSentinel are comparing it to the libraries listed below
Sorting:
- Extracts Windows user info including the password hashes☆41Updated 9 years ago
- ☆53Updated 4 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- Operation Fast Cash - Hidden Cobra ‘s AIX PowerPC malware dissected☆26Updated 6 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆19Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- A list of Autopsy awesome plugins.☆74Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆25Updated 6 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆90Updated last year
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Wireless Pentesting Device☆23Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- python hash cracker☆52Updated 9 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago