Stars
thehappydinoa / iLEAPP
Forked from abrignoni/iLEAPPiOS Logs, Events, And Preferences Parser
thehappydinoa / iOSRestrictionBruteForce
Forked from yuejd/ios_Restriction_PassCode_Crack---Python-versionCrack iOS Restriction Passcodes with Python
bdwilson / arp_notify
Forked from kspillane/arp_notifyA network device ARP monitor Vyatta/EdgeMax routers with Pushover & Webhooks
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Malware and other applications may install persistent keyboard "event taps" to intercept your keystrokes. ReiKey can scan, detect, and monitor for such taps!
VSAQ is an interactive questionnaire application to assess the security programs of third parties.
A forensic evidence collection & analysis toolkit for OS X
Quitten / WordPress
Forked from WordPress/WordPressFork includes patch for DoS vulenrability (CVE-2018-6389)
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
A collection of awesome penetration testing resources, tools and other shiny things
Wrong project! You should head over to http://github.com/sshuttle/sshuttle
A type-safe, reflection-free, powerful enumeration implementation for Scala with exhaustive pattern match warnings and helpful integrations.
Event-driven networking engine written in Python.
UNOFFICIAL fork of haproxy development repository - ISSUE REPORTS ARE IGNORED!
The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose files, issue tracking, and documentation
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to invest…
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
Package stun provides basic functions for the manipulation of messages used in the Session Traversal Utilities for NAT (STUN), Traversal Using Relays around NAT (TURN) and Interactive Connectivity …
An advanced memory forensics framework
Collection of things made during my OSCP journey
Sysmon configuration file template with default high-quality event tracing