Sunday, May 31, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...

Must Need

AgentSmith-HIDS : Open Source Host-based Intrusion Detection System

AgentSmith-HIDS : Open Source Host-based Intrusion Detection System

Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However,...
Seccomp Tools : Provide Powerful Tools For Seccomp Analysis

Seccomp Tools : Provide Powerful Tools For Seccomp Analysis

Seccomp provide powerful tools for seccomp analysis. This project is targeted to (but not limited to) analyze seccomp sandbox in CTF pwn...
Seeker

Seeker – Find Device Information & Geo Location with High Accuracy

Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and Geo Location with High Accuracy. Seeker Hosts a fake website on Apache Server...
Adapt

Adapt : A Tool To Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed,...
SharpRDP : RDP Application For Authenticated Command Execution

SharpRDP : RDP Application For Authenticated Command Execution

SharpRDP is a Remote Desktop Protocol Console Application for Authenticated Command Execution. Building To compile...
Raptor

Raptor WAF : Web Application Firewall Using DFA Beta

Raptor is a Web application firewall made in C, uses DFA to block SQL injection, Cross site scripting and path traversal.
HT-WPS-Breaker

HT-WPS-Breaker : High Touch WPS Breaker

High Touch HT-WPS-BREAKER is a small tool based on the bash script language, it can help you to extract the wps pin...