yadox666 / Forensic_GETLinks
☆25Updated 4 years ago
Alternatives and similar repositories for Forensic_GET
Users that are interested in Forensic_GET are comparing it to the libraries listed below
Sorting:
- Distrubición Linux para Osint☆57Updated 7 years ago
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35Updated 8 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- Scripts de geolocalización☆15Updated 3 years ago
- Actualización de Huron, distro Linux para Osint☆21Updated 6 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- EO-RIPPER.PY es una herramienta que nos permite hacer OSINT con un email o con una lista de emails.☆76Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 6 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆151Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- ☆17Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- ATTPwn☆217Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- Create visualization from Shodan query☆76Updated 4 years ago
- ☆67Updated 2 months ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆121Updated 6 years ago
- Slides for my conference talks☆45Updated 2 years ago
- OSINT dating tool for web pages☆123Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- ☆150Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago