yogsec / Digital-Forensics-Tools
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.
โ31Updated last week
Alternatives and similar repositories for Digital-Forensics-Tools:
Users that are interested in Digital-Forensics-Tools are comparing it to the libraries listed below
- Minimalist notes for CEH-practical Cert.โ31Updated 2 years ago
- ๐ LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.โ53Updated 3 months ago
- ๐ช XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XSโฆโ51Updated 3 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-upโฆโ58Updated 3 months ago
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulneโฆโ109Updated last week
- INE Training Notesโ29Updated last month
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).โ94Updated last week
- Lists various tools used in hardware hacking.โ24Updated last week
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whilโฆโ38Updated 3 weeks ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioโฆโ89Updated 2 weeks ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as APIโฆโ37Updated 3 months ago
- โ51Updated last year
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, crโฆโ23Updated 3 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutefโฆโ108Updated 3 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their sโฆโ45Updated 3 weeks ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectโฆโ75Updated 6 months ago
- OSCP Cheatsheet by Sai Sathvikโ68Updated last year
- Tool for automate bug hunting process ๐ --> ๐ญโ35Updated 7 months ago
- โ56Updated 7 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.โ45Updated 2 years ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a varโฆโ35Updated last month
- โ45Updated 3 weeks ago
- Python for AWAE (Advanced Web Attacks and Exploitation)โ93Updated last year
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified Pโฆโ132Updated this week
- โก XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.โ53Updated 2 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hโฆโ68Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeโฆโ127Updated 2 weeks ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working oโฆโ46Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.โ71Updated 2 months ago
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ73Updated last month