{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"pyxor","owner":"Anti-Forensics","isFork":false,"description":"Execute XOR encrypted Python code in memory.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-25T23:49:34.728Z"}},{"type":"Public","name":"allthesecontainers","owner":"Anti-Forensics","isFork":false,"description":"Creates an unlimited amount of empty VeraCrypt (.hc) containers with generated passwords. The script will output a password list that you can include as well to help frustrate an examination, as each VeraCrypt container will need to be opened and examined during an investigation.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-30T23:16:24.871Z"}},{"type":"Public","name":"tuckerenc","owner":"Anti-Forensics","isFork":false,"description":"tuckerenc is an implmentation of LSB Steganography with fernet encryption in Python.","allTopics":["cybersecurity","anti-forensics","digitalforensics"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-29T22:34:45.450Z"}},{"type":"Public","name":"tuckerlsb","owner":"Anti-Forensics","isFork":false,"description":"tuckerlsb is an implementation of LSB Steganography in Python.","allTopics":["cybersecurity","anti-forensics"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-28T21:53:15.415Z"}},{"type":"Public","name":"tucker","owner":"Anti-Forensics","isFork":false,"description":"Hide a zip in a jpg file by concatenating a jpg with a zip file.","allTopics":["cybersecurity","anti-forensics"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-23T23:04:18.869Z"}},{"type":"Public","name":"get_notepad","owner":"Anti-Forensics","isFork":false,"description":"This application will dump the notepad tab cache to json format.","allTopics":["cybersecurity","anti-forensics","digitalforensics"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":1,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-29T23:24:49.436Z"}},{"type":"Public","name":"user_deassist","owner":"Anti-Forensics","isFork":false,"description":"Enable or Disable UserAssist logging.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-23T23:20:17.980Z"}},{"type":"Public","name":"SharpTimestomp","owner":"Anti-Forensics","isFork":false,"description":"Timestomp in C#","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":2,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-29T19:38:53.117Z"}},{"type":"Public","name":"shkval","owner":"Anti-Forensics","isFork":false,"description":"Wipe (shred) a file on a remote file system by forging and sending a IP/TCP packet utilizing the TCP source port as a key and the TCP \"options\" field as a one-time password. ","allTopics":["anti-forensics","pythonprogramming","digitalforensics"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-28T19:19:42.539Z"}},{"type":"Public","name":"SimpleWiper","owner":"Anti-Forensics","isFork":false,"description":"Simple Windows and Linux Data Wiping Projects","allTopics":["csharp","cybersecurity","anti-forensics","digitalforensics"],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-18T22:38:15.464Z"}},{"type":"Public","name":"SimpleEncryptor","owner":"Anti-Forensics","isFork":false,"description":"Encrypt and decrypt files with AES 256 CBC (C#)","allTopics":["csharp","cybersecurity","digitalforensics"],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-12T04:16:52.291Z"}}],"repositoryCount":11,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Anti-Forensics repositories"}