Monday, September 21, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
What is Email Spoofing? and How to Avoid It?

What is Email Spoofing? and How to Avoid It?

Have you ever seen emails that looked genuine but were a scam? Well, these are...
The Role of Digital Forensics in Solving Cyber Crimes

The Role of Digital Forensics in Solving Cyber Crimes

Your mobile app developers today have to understand more than simply putting together some code. They have to...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...

Must Need

Chromepass : Hacking Chrome Saved Passwords

Chromepass : Hacking Chrome Saved Passwords

Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved paswordsSend...
Dow Jones Hammer : Protect The Cloud With The Power Of The Cloud(AWS)

Dow Jones Hammer : Protect The Cloud With The Power Of...

Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS...
DDoS

Top 5 DDoS Attacking Tools For Linux,Windows & Android

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many computers are used to...
Frida-Fuzzer : Experimental Fuzzer Used For API In-Memory Fuzzing

Frida-Fuzzer : Experimental Fuzzer Used For API In-Memory Fuzzing

Frida-Fuzzer is a experimental fuzzer is meant to be used for API in-memory fuzzing. The design is highly inspired and based on...
HuskyCI : Performing Security Tests Inside Your CI

HuskyCI : Performing Security Tests Inside Your CI

HuskyCI is an open source tool that orchestrates security tests and centralizes all results into a database for further analysis and...
Sandcastle : A Python Script For AWS S3 Bucket Enumeration

Sandcastle : A Python Script For AWS S3 Bucket Enumeration

Inspired by a conversation with Instacart's @nickelser on HackerOne, I've optimized and published Sandcastle – a Python script for AWS S3 bucket...
Bug Bounty

What is Bug Bounty Program?

A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming...