Linux Expl0rer – A Comprehensive Forensics Toolbox For Linux Endpoints
Linux Expl0rer, an easy-to-use, live forensics toolbox designed for Linux endpoints. Built with Python and Flask, this toolkit facilitates comprehensive analysis and monitoring of system activities. Despite no longer being maintained, Linux Expl0rer remains a valuable resource for those needing to inspect processes, search for suspicious files, and more, with built-in support for major public security services. Capabilities PS View full process...
OnionSearch – Navigating The Depths Of The Dark Web
OnionSearch is a powerful Python3 tool designed for scraping URLs from various ".onion" search engines on the dark web. Ideal for researchers and cybersecurity professionals, this script offers a streamlined approach to accessing hidden services. With support for multiple search engines and customizable search parameters, OnionSearch is an essential utility for deep web exploration. Currently Supported Search Engines ahmia darksearchio onionland notevil darksearchenginer phobos onionsearchserver torgle onionsearchengine tordex tor66 tormax haystack multivac evosearch deeplink Installation With PyPI pip3 install...
Quidam – Leveraging Forgotten Password Functions For Information Retrieval
Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user information. This open-source intelligence tool, compatible with Python, enables users to access data such as email addresses and phone numbers from sites like Twitter, Instagram, and GitHub. Ideal for educational and research purposes, Quidam is a must-have for anyone...
Firefox For OSINT And Security Research – A Guide For Cybersecurity Enthusiasts
In the evolving landscape of cybersecurity, having the right tools is crucial for effective security investigations. This article explores how to configure Firefox with advanced security and intelligence features tailored for Open Source Intelligence (OSINT) and security research. Learn how to set up and run a specialized script that enhances Firefox for your cybersecurity needs. Configure FireFox with Security and...
Mobile Verification Toolkit (MVT) – A Forensic Tool For Investigating Spyware On Mobile Devices
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus Project along with a technical forensic methodology. It continues to be maintained by Amnesty...
Forensics Tools – A Comprehensive Guide To Free And Open Source Resources
In the evolving field of digital forensics, having access to the right tools can make all the difference. This article provides a curated list of free and open-source forensic tools and resources designed for various types of digital investigations. From live forensics and data acquisition to detailed artifact analysis and decryption, each category offers a suite of tools tailored...
Data Analysis Help – Enhancing Tools, Tips, And Python Techniques
"Data Analysis Help: Enhancing Tools, Tips, and Python Techniques," your go-to resource for improving your data analysis skills. This article is designed as a collaborative space where both novices and seasoned analysts can share and learn various tips, tricks, and methodologies. Here, we explore powerful tools such as Python's xarray, NCO, and Panoply, providing practical guidance and examples. Whether...
Spearf1sh – A Comprehensive Guide To The Embedded Hacking Tool And Distribution
Spearf1sh Embedded Hacking Tool and Distro. The ultimate embedded hacking tool designed for Zynq and Pynq development boards. This specialized distro leverages the power of ARM Cortex-A SoCs and FPGAs to provide a robust platform for embedded Linux applications. With easy installation and comprehensive support for multiple Xilinx Zynq 7020 based platforms, Spearf1sh is the go-to choice for developers...
Pelicam – Enhancing Network Security through IP Camera Vulnerability Detection
Pelicam is an open-source project developed to improve local network security by identifying and raising awareness of IP camera vulnerabilities. It is designed for security researchers, cybersecurity professionals and technology enthusiasts who want to understand and mitigate the risks associated with these connected devices. Our aim is for the project to be continually updated and improved. Our tool can...
Ethical Hacking Using John The Ripper : A Step-by-Step Guide To Password Cracking
This repository contains a set of shell scripts designed to facilitate the ethical hacking process using John the Ripper, a powerful password cracking tool. The project is divided into two main scripts: prerequisites.sh and pass_crack.sh, each serving a distinct purpose in the password cracking workflow. Files: prerequisites.sh: This script automates the setup process by updating system repositories, installing necessary dependencies, downloading...