Sunday, August 25, 2019

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...

Must Need

SocialFish To Easily And Quickly Create Phishing Sites

Ultimate phishing tool with Ngrok integrated. Using this tool anyone can easily and quickly create a phishing sites. The utilization of the SocialFish is COMPLETE...
IT and Tech Challenges

The Top IT and Tech Challenges for Businesses in 2019

Companies, whether small, large, or enterprise-level organizations face their fair share of challenges at any given time. Currently, many of the most...
NoSQLMap : Automated NoSQL Database Enumeration & Web Application Exploitation Tool

NoSQLMap : Automated NoSQL Database Enumeration & Web Application Exploitation Tool

NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses...
Door404

Door404 – Door404 is Open Source Project

Door404 is Open Source Project Developed For 2 Reasons, Help Beginners to learn coding . Help Newbie Servers Managers To Learn New Protection Tricks. It...
MXtract

MXtract – Memory Extractor & Analyser

MXtract is an opensource Linux based tool that analyses and dumps memory. Its developed as an offensive pentration testing tool which...
Sandsifter

Sandsifter – The x86 Processor Fuzzer For Hidden Instructions & Hardware...

The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a processor's instruction set, and...
ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

ThreatHunting is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate.

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout