Friday, February 21, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature...

Must Need

Vulnx : Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS

Vulnx : Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of CMS, fast cms detection,information gathering and vulnerabilities...
OWTF

OWTF – Offensive Web Testing Framework Great Tools & Make Pen...

OWTF or Offensive Web Testing Framework, is a framework which tries to unite great tools and make pen testing more efficient. OWASP OWTF is...
TrigMap : A Wrapper For Nmap To Automate The Pentest

TrigMap : A Wrapper For Nmap To Automate The Pentest

Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect information into a...
Why should you build your next app with Flutter?

Why should you build your next app with Flutter?

If you want to stay up to date, you will need to develop an app for your product or service. And...
HiddenWall : Linux Kernel Module Generator For Custom Rules With Netfilter

HiddenWall : Linux Kernel Module Generator For Custom Rules With Netfilter

HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on...
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )
Jaeles : The Swiss Army Knife For Automated Web Application Testing

Jaeles : The Swiss Army Knife For Automated Web Application Testing

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.