Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Forensics   /   Page 5
python-haystack - a memory forensic & Process heap analysis framework.

python-haystack – a memory forensic & Process heap analysis framework.

June 15, 2017
cydec
Digital Forensics, Framework, Registry Analysis

python-haystack is an heap analysis framework, focused on searching and reversing of C structure in allocated memory. The first function/API is the SEARCH function. It…

Read Article →
BigBrainSecurity - a forensics scripts that will eventually turn into an IDS.

BigBrainSecurity – a forensics scripts that will eventually turn into an IDS.

June 5, 2017
King-Pin
Digital Forensics, Intrussion Detection and Prevention System(IDS/IPS)

BigBrainSecurity/cleanMFT.py filters master file tables and makes them more bearable to deal with. The primary use of the program is to import a text file…

Read Article →
lifer - A forensics tool for Windows link file examinations (i.e. Windows shortcuts).

lifer – A forensics tool for Windows link file examinations (i.e. Windows shortcuts).

May 10, 2017
anon80
Digital Forensics

‘lifer‘ is a Windows or *nix command-line tool inspired by the whitepaper ‘The Meaning of Link Files in Forensic Examinations’ by Harry Parsonage and available…

Read Article →
Operative v1.0b - The Fingerprint Framework.

Operative v1.0b – The Fingerprint Framework.

May 7, 2017
Fragile
Digital Forensics, Framework, Penetration Test

Changelog Operative v1.0b: + Generate new module file for developpers + Campaign function + Import of ‘export module’ + JSON export module + XML export…

Read Article →
PytheM v0.6.7 - Penetration Testing Framework.

PytheM v0.6.7 – Penetration Testing Framework.

April 30, 2017
Infosec
Brute Force, Framework, Penetration Test

Changelog PytheM v0.6.7: + ARP spoofing improve. + History completer for session. + adding more command-line help messages. + http sniffer updated. + SSLKill as…

Read Article →
pom-ng is a real time network forensic tool.

pom-ng is a real time network forensic tool.

April 7, 2017
ghost
Digital Forensics, Networking

pom-ng is a network forensics tool that parses network traffic from files, network interfaces and other and allow you to get any information you wish…

Read Article →
logdissect is a tool for gaining insight into syslog files.

logdissect is a tool for gaining insight into syslog files.

March 26, 2017
King-Pin
Digital Forensics, Networking

logdissect is a tool for gaining insight into syslog files. It can merge multiple log files together and sort by timestamp, and filter the results…

Read Article →
passivedns - A tool to collect DNS records passively to aid Network Security Monitoring (NSM) & general digital forensics.

passivedns – A tool to collect DNS records passively to aid Network Security Monitoring (NSM) & general digital forensics.

March 17, 2017
King-Pin
Anti Malware/Virus - Malware Analysis, Digital Forensics, Monitoring/System Administrator, Networking

PassiveDNS is A tool to collect DNS records passively to aid Incident handling, Network Security Monitoring (NSM) and general digital forensics. PassiveDNS sniffs traffic from…

Read Article →
← Previous 1 … 4 5 6 … 18 Next →

Copyright © 2018

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools