☆99Sep 15, 2025Updated 5 months ago
Alternatives and similar repositories for tscopy
Users that are interested in tscopy are comparing it to the libraries listed below
Sorting:
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 4 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- ☆156Updated this week
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to u…☆103Apr 17, 2020Updated 5 years ago
- Commandline low level file extractor for NTFS☆307Jul 30, 2019Updated 6 years ago
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Aug 9, 2015Updated 10 years ago
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- An NTFS/FAT parser for digital forensics & incident response☆217Oct 31, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 3 weeks ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆132May 7, 2024Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- Metasploit Framework☆29Dec 11, 2013Updated 12 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Apr 13, 2017Updated 8 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- Script to process PDF files☆21May 23, 2025Updated 9 months ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆79Sep 15, 2016Updated 9 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- Golang reverse/bind shell generator☆229Jan 3, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Mar 9, 2021Updated 4 years ago