☆24Jul 14, 2021Updated 4 years ago
Alternatives and similar repositories for Forensic_GET
Users that are interested in Forensic_GET are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example script that recovers metadata from PDF and DOCX files☆14Aug 26, 2020Updated 5 years ago
- Se trata de un análisis forense de un caso real, que por medio de una imagen, se obtiene una serie de datos que ayudan a una investigació…☆22May 11, 2018Updated 7 years ago
- Snapweb Project: Congela tu Web!!☆15Oct 27, 2015Updated 10 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Feb 1, 2017Updated 9 years ago
- A curated list of digital forensic tools.☆21Dec 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- ☆33Nov 21, 2024Updated last year
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- TakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nue…☆41Jun 24, 2018Updated 7 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆16Jul 19, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- ☆17May 28, 2022Updated 3 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Un proyecto sobre metadatos del guild de ciberseguridad☆12Dec 6, 2023Updated 2 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 5 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Fork this repo! Do a Pull Request! As many times as you want! Learn the ins and outs of how to contribute to GitHub! Make your mistakes h…☆14Jun 21, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Jul 7, 2023Updated 2 years ago
- A set of tools for collecting forensic information☆28Apr 4, 2020Updated 6 years ago
- An ocrmypdf front-end / batch job designer☆17Sep 1, 2023Updated 2 years ago
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- A repo that contains links to projects by members of the Digital Forensics Discord Server! This is meant to help promote projects made by…☆21Apr 23, 2026Updated 2 weeks ago
- Aspose.Email for Python via .NET Examples: https://products.aspose.com/email/python-net☆10Oct 9, 2025Updated 6 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Aug 1, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆12Apr 26, 2026Updated last week
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Python library for easy handling of disk-images☆12Feb 11, 2026Updated 2 months ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago