xaitax / TotalRecallLinks
This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots.
☆2,030Updated last year
Alternatives and similar repositories for TotalRecall
Users that are interested in TotalRecall are comparing it to the libraries listed below
Sorting:
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 3 weeks ago
- A simple, very experimental TPM sniffer for LPC bus☆605Updated last year
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆177Updated 2 months ago
- The Secure Microsoft Windows Downloader☆597Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- A collection of fascinating and bizarre Censys Search Queries☆1,133Updated last month
- A tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API☆917Updated 3 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,098Updated 11 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,378Updated last year
- C2 infrastructure over Microsoft Teams.☆690Updated 6 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,023Updated last year
- Original PoC for CVE-2023-32784☆643Updated last year
- A GUI and CLI tool for removing bloat from executables☆408Updated last week
- Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the …☆2,670Updated last week
- Autonomous Privilege Escalation using AI☆802Updated 3 months ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,379Updated 4 months ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,546Updated this week
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,038Updated last month
- ☆441Updated last year
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆387Updated 3 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,525Updated last year
- Phishing with a fake reCAPTCHA☆575Updated 10 months ago
- ☆528Updated last month
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,022Updated 2 weeks ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆787Updated 10 months ago
- ☆614Updated 6 months ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆668Updated 2 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆673Updated 8 months ago
- A list of public attacks on BitLocker☆313Updated 5 months ago
- SSHamble: Unexpected Exposures in SSH☆968Updated 2 weeks ago