Friday, April 3, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...

Must Need

Barq: The AWS Cloud Post Exploitation Framework

Barq: The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...
Nameles

Nameles – Open Source Entropy Based Invalid Traffic Detection & Pre-bid...

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad...
Writing Tools

Top 5 Writing Tools Every Linux Enthusiast Should Use

Good writing skills are very important and necessary especially to students and people that do professional writing. The quality of the final...
Pylane : An Python VM Injector With Debug Tools, Based On GDB

Pylane : An Python VM Injector With Debug Tools, Based On...

Pylane is a python vm injector with debug tools, based on gdb and ptrace. Pylane uses gdb to trace python process, inject...
LOLBAS

LOLBAS – Living Off The Land Binaries And Scripts

LOLBAS is the living off the land binaries and scripts. All the different files can be found behind a fancy frontend...
DVNA : Damn Vulnerable NodeJS Application

DVNA : Damn Vulnerable NodeJS Application

Damn Vulnerable NodeJS Application (DVNA) is a simple NodeJS application to demonstrate OWASP Top 10 Vulnerabilities and guide on fixing and avoiding...
Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued...