HiddenVM — Use any desktop OS without leaving a trace.
-
Updated
Jul 18, 2024 - Shell
HiddenVM — Use any desktop OS without leaving a trace.
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
Kernel rootkit, that lives inside the Windows registry values data
Anti-forensic macOS tray application designed to safeguard your system by monitoring USB ports.
Wipe files and drives securely with randoms ASCII dicks
中文化的隐私加强 GNU/Linux 系统 - Forked from Alien Bob's powerful building script for Slackware Live.
Wipe files and drives securely with random ASCII dicks
A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware
A simple Metadata Removal Tool for images and videos using exiftool and ffmpeg in C and Python3.
Fileless persistence, attacks and anti-forensic capabilties.
Windows anti-forensics USB monitoring tool.
Kernel-namespaces-based alternative to proxychains.
Clear diverses Logs and History Files saved by Windows.
A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes
A C# (.NET 6) tool to compare the file signature of files recursively and inform the user of matches and mismatches
🔫 lkm module for emergency binary/script execution
Add a description, image, and links to the anti-forensics topic page so that developers can more easily learn about it.
To associate your repository with the anti-forensics topic, visit your repo's landing page and select "manage topics."