Pinned Repositories
ADEL
Android Data Extractor Lite
Android-IMSI-Catcher-Detector
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
Android-PIN-Bruteforce
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
angular
bettercap
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
CapacitacionBG
Repositorio personal sobre mi capacitación de parte del Banco General
CiLocks
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
covid-green-app
Criptext-Email-React-Client
Front-end development of criptext email client using react
mratok1's Repositories
mratok1/usbrip
Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux
mratok1/DanderSpritz_lab
A fully functional DanderSpritz lab in 2 commands
mratok1/msmailprobe
Office 365 and Exchange Enumeration
mratok1/yersinia
A framework for layer 2 attacks
mratok1/DanderSpritz_docs
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
mratok1/NBTEMPOW
NBTempoW V. 2.1 is a forensic tool for making timelines from block devices image files (raw, ewf,physicaldrive, etc.). It uses TSK (The Sleuthkit) and it has been developed with Lazarus V. 1.6.2 ( Delphi compatible cross-platform IDE for Rapid Application Development). It runs only in Windows. If the device image file is splitted, you can select just the first chunk.
mratok1/ADEL
Android Data Extractor Lite