Kernel rootkit, that lives inside the Windows registry values data
-
Updated
Oct 8, 2017 - C
Kernel rootkit, that lives inside the Windows registry values data
Clear diverses Logs and History Files saved by Windows.
🔫 lkm module for emergency binary/script execution
A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Fileless persistence, attacks and anti-forensic capabilties.
An Experimental Framework for Implementing Filesystem-Based Data Hiding
Wipe files and drives securely with randoms ASCII dicks
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
A tool to spoof a forensics investigator by randomising the hardware clock so it is difficult to tell when a files were written, making the job much harder and time consuming.
Very very basic program to wipe free space on a drive, that can run on just bash. No other dependencies or libraries necessary (The aim was to have it run on android with bash installed)
Camera Trace Erasing in CVPR 2020
spoof OS detection by messing with the tcp stack
Secure File Removal
Mirror of https://gitlab.com/4shadoww/ldms
Anti-Forensic tool for data hiding on FAT32 Filesystem. It exploits Directory Entry.
A counter forensics tool to make data on a storage medium unrecoverable.
Antiforensic actions to secure your device if it's physically stolen from you
Trigger to close encrypted cryptomator volumes
Add a description, image, and links to the anti-forensics topic page so that developers can more easily learn about it.
To associate your repository with the anti-forensics topic, visit your repo's landing page and select "manage topics."