Sunday, August 25, 2019

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

No posts to display

Must Need

Caldera : An Automated Adversary Emulation System

Caldera : An Automated Adversary Emulation System

CALDERA is an automated adversary emulation system, built on the MITRE ATT&CK™ framework. It works by attaching abilities to an adversary and running...
CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the...
RDPScan : A Quick Scanner For “BlueKeep”  Vulnerability

RDPScan : A Quick Scanner For “BlueKeep” Vulnerability

RDPScan is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability in Microsoft Remote Desktop. Right now, there are about 900,000 machines on the...
CGPwn

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire up the VM git clone https://github.com/0xM3R/cgPwn cd...
Prithvi – Report Generation Tool

Prithvi – Report Generation Tool

Prithvi is a report generation tool specially made for Security Assessment which is free to use and easy to use. It will...
Dow Jones Hammer : Protect The Cloud With The Power Of The Cloud(AWS)

Dow Jones Hammer : Protect The Cloud With The Power Of...

Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS...
ImaginaryC2

ImaginaryC2:Python Tool Help In Network Behavioral Analysis Of Malware

ImaginaryC2 is a python tool which aims to help in the behavioral (network) analysis of malware. It hosts a HTTP server which...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout