Tuesday, January 22, 2019

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

No posts to display

Must Need

UBoat

UBoat – A POC HTTP Botnet Project

UBoat HTTP is a POC HTTP Botnet designed to replicate a full weaponized commercial botnet. UBoat Uses Coded in C++ with no dependencies Encrypted C&C...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference is that WAFs work...
Dawnscanner

Dawnscanner – Static Analysis Security Scanner

Dawnscanner is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature enough to ward off...
Malcom

Malcom – Malware Communications Analyzer 2019

Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic, and cross-reference ...
SSH Auditor

SSH Auditor – Scan For Weak SSH Passwords On Your Network

SSH Auditor is the best way to scan for weak ssh passwords on your network. SSH Auditor will automatically: Re-check all known hosts as...

GTRS – Google Translator Reverse Shell 2018

GTRS tools uses Google Translator as a proxy to send arbitrary commands to an infected machine. ==HTTPS==> ==HTTP==> GTRS Environment Configuration First you need a...