Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service

hashlookup-forensic-analyser Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public
Information
Category: Python / Security related resources
Watchers: 1
Star: 11
Fork: 2
Last update: Oct 13, 2021

Related Repos



l3eol3eo CVE-2021-32099 SQLi Bypass login Useful when trying to read User Flag on Pandora.htb CVE-2021-32099 SQLi allow attacker bypass login. Target Exploit o
 

antx-code CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP
 

p0dalirius CVE-2022-21907 - Double Free in http.sys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request he
 

jonathandata1 Mobile & IOT Malware, Spyware, & Forensic Analysis Author: Jonathan Scott Twitter: @jonathandata1 Version 1.0 This repository contains methods, and to
 

attakercyebr Program Features - ๐Ÿ“Œ Hack all Android phones. - ๐Ÿ“Œ Failure to detect antivirus. - ๐Ÿ“Œ Superior encryption - ๐Ÿ“Œ Source provided - ๐Ÿ“Œ 100 ูช FUD - ๐Ÿ“Œ It
 

Lujeni Volatile Fast and easy way to rollout on multiple GitLab project file a particular content. Why ? After looking for a tool to simply enforce a develop
 

kumarvicku ๐Ÿ…ผ๐Ÿ…ฐ๐Ÿ…ณ๐Ÿ…ด ๐Ÿ††๐Ÿ…ธ๐Ÿ†ƒ๐Ÿ…ท ๐Ÿ…ฟ ๐Ÿ†ˆ๐Ÿ†ƒ๐Ÿ…ท๐Ÿ…พ๐Ÿ…ฝ ๐Ÿ†… ๐Ÿ…ฟ ๐Ÿ…ท๐Ÿ…ธ๐Ÿ†‚๐Ÿ…ท๐Ÿ…ด๐Ÿ† [+] ๐•ฏ๐–Š๐–˜๐–ˆ๐–—๐–Ž๐–•๐–™๐–Ž๐–”๐–“ : Ultimate phishing tool ,A beginners friendly, Automated phishing tool
 

psiinon open-source-web-scanners A list of open source web security scanners on GitHub. General Purpose Web Scanners Main Site Last Commit Committers Stars Ar
 

vapen-hem This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file. And so I made this simple password database, that can encrypt, decrypt files, and generate Passwords, pin codes, and encryption keys. It took me about 4 - 6 months to make (Total I spent like 2 - 3 making it, but there were a lot of times where I did not work on the program) It is not 100% fine-tuned, but it works very well as is.
 

cert-ee Cuckoo 3 Cuckoo 3 is a Python 3 open source automated malware analysis system. For setup instructions, please refer to our documentation. This is a de
 

LetsDefend Phishing Email Analysis Useful tools MX Lookup Online URL/Attachment Analysis Tools AnyRun Browserling Hybrid Analysis urlscan Reputation Check Virust
 

izzitmichaela README This small script takes any decklist from an MTGO list and pulls all card images as jpg or png files into your directory. If you like this pr
 

Raiders0786 ClickJackPoc This tool will help you automate finding Clickjacking Vulnerability by just passing a file containing list of Targets . Once the Target i
 

elbee-cyber Hackerone Passive Recon Tool A passive-recon tool that parses through found assets and interacts with the Hackerone API. Setup Simply run setup.sh to
 

puzzlepeaches Log4jHorizon Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more. Crossing the Log4j Horizon - A Vulnerability With No Retu