Sunday, August 25, 2019

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...

Must Need

WindowsSpyBlocker

WindowsSpyBlocker – Block Spying & Tracking On Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach...

theZoo – A Repository Of LIVE Malwares For Your Own Joy...

theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis to have access to live malware, analyses...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.
Pentest Machine

Pentest Machine – Automates Some Pentest Jobs Via Nmap xml File

Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its output to the terminal...

Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep...
Xori

Xori : An Automation-Ready Disassembly & Static Analysis Library

Xori is an automation-ready disassembly and static analysis library that consumes shellcode or PE binaries and provides triage analysis data.

GTRS – Google Translator Reverse Shell 2018

GTRS tools uses Google Translator as a proxy to send arbitrary commands to an infected machine. ==HTTPS==> ==HTTP==> GTRS Environment Configuration First you need a...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout