Tuesday, August 3, 2021

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
What is Email Spoofing? and How to Avoid It?

What is Email Spoofing? and How to Avoid It?

Have you ever seen emails that looked genuine but were a scam? Well, these are...
The Role of Digital Forensics in Solving Cyber Crimes

The Role of Digital Forensics in Solving Cyber Crimes

Your mobile app developers today have to understand more than simply putting together some code. They have to...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...

Must Need

Web Hacker’s Weapons : Collection Of Cool Tools Used By Web Hackers

Web Hacker’s Weapons : Collection Of Cool Tools Used By Web...

Web Hacker's Weapons is a collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting.
FFUF : Fast Web Fuzzer Written In Go

FFUF : Fast Web Fuzzer Written In Go

FFUF is a fast web fuzzer written in Go. So let have a look on some of the features of the tool...
BlobHunter : Find Exposed Data In Azure With This Public Blob Scanner

BlobHunter : Find Exposed Data In Azure With This Public Blob...

BlobHunter is an opensource tool for scanning Azure blob storage accounts for publicly opened blobs.BlobHunter is a part of "Hunting Azure Blobs...
HashCobra : Hash Cracking Tool

HashCobra : Hash Cracking Tool

HashCobra is a tool uses a new method to crack hashes. With the help of rainbow tables concept this tool generates rainbow...
Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols

Cotopaxi : Set Of Tools For Security Testing Of Internet Of...

Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.
Fuzzilli : A JavaScript Engine Fuzzer

Fuzzilli : A JavaScript Engine Fuzzer

Fuzzilli is a (coverage-)guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated...
CredPhish : A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS

CredPhish : A PowerShell Script Designed To Invoke Legitimate Credential Prompts...

CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS exfiltration, and...