threeplanetssoftware / bplister
Quick and dirty script to parse bplists with Ruby
☆11Updated 4 years ago
Alternatives and similar repositories for bplister:
Users that are interested in bplister are comparing it to the libraries listed below
- Digital Forensics date and time☆23Updated 2 months ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Open YARA scan- and search engine☆19Updated last week
- Queries for parsed spotlight database in sqlite☆12Updated 4 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆15Updated last year
- CLI tools using Harpoon features☆21Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 8 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 10 months ago
- Tools for macOS Forensic Bootable media☆15Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 4 months ago
- For Public Objects☆21Updated 4 months ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated last month
- Auto updating archive of my Twitter lists.☆15Updated 2 months ago
- Powershell scripts☆12Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- hacking tools awesome lists☆14Updated 7 years ago
- Python CLI and module for CIRCL hash lookup☆12Updated last month
- A library & tool for probing, parsing, and validating security.txt files as specified in RFC 9116☆14Updated 2 weeks ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆26Updated 5 years ago
- Search a list of domains on the wayback machine☆14Updated 5 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- cool dockerfiles☆12Updated 8 years ago