Wednesday, April 1, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

No posts to display

Must Need

5 Tips to Protect Yourself from Cyberattacks at The University

5 Tips to Protect Yourself from Cyberattacks at The University

Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as targets of...

Anti-DDoS : Anti DDOS Bash Script To Defend Against DDOS Attacks

An open source project developed against the DOS and DDoS attack by writing iptables rules into the Linux OS is called the Anti-DDoS project. We...
LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

LANGhost is designed for Raspberry Pis (Raspbian/Kali for RPi). Running it on other/desktop distros could cause issues and may not work as...
CAPE : Malware Configuration And Payload Extraction

CAPE : Malware Configuration And Payload Extraction

CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of malware analysis with...
Raptor

Raptor WAF : Web Application Firewall Using DFA Beta

Raptor is a Web application firewall made in C, uses DFA to block SQL injection, Cross site scripting and path traversal.
Best Way to Learn Programming Online If You’re Tired of Books and Tutors

Best Way to Learn Programming Online If You’re Tired of Books...

Today programming is taking the reins of the world's labor market. Ever developing, much promising and forward-looking, it's really worthwhile learning and...
PureBlood

PureBlood – A Penetration Testing Framework created for Hackers / Pentester...

PureBlood is a tool for penetration testing framework created for Hackers / Pentester / Bug Hunter. Thanks to Cr4sHCoD3 for developing the tool. Also Read Dejavu...