Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Infosec_reference | 5,305 | 5 months ago | mit | CSS | ||||||
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version. | ||||||||||
Free Security Ebooks | 4,105 | 5 years ago | 3 | |||||||
Free Security and Hacking eBooks | ||||||||||
Awesome Hacking | 2,716 | 3 months ago | Python | |||||||
Awesome hacking is an awesome collection of hacking tools. | ||||||||||
Fbi Tools | 1,153 | 2 months ago | 2 | |||||||
🕵️ OSINT Tools for gathering information and actions forensics 🕵️ | ||||||||||
Recoverpy | 1,150 | 14 days ago | 30 | November 26, 2023 | 1 | gpl-3.0 | Python | |||
Interactively find and recover deleted or :point_right: overwritten :point_left: files from your terminal | ||||||||||
Hackdroid | 753 | a year ago | 1 | mit | ||||||
Pentesting Using Android | ||||||||||
Gosint | 567 | 3 years ago | 16 | gpl-3.0 | Go | |||||
OSINT Swiss Army Knife | ||||||||||
Windows_security | 245 | a year ago | gpl-3.0 | |||||||
Is Windows a joke or are you? 🧢 | ||||||||||
Information Security Tasks | 162 | 3 months ago | 4 | HTML | ||||||
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions | ||||||||||
Remote Desktop Caching | 155 | 6 years ago | 1 | Python | ||||||
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis. |