Echo Mirage 3.1 :: Tools Echo Mirage 3.1 :: Tools

Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...

Read more »

File Checksum Integrity Verifier (FCIV) :: Tools File Checksum Integrity Verifier (FCIV) :: Tools

The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...

Read more »

Distributed Network Attack (DNA) :: Framework Distributed Network Attack (DNA) :: Framework

Distributed Network Attack (DNA) is a new approach to recovering password protected files . In the past, recoveries have been limi...

Read more »

Volatility (Advanced Memory Forensics Framework) :: Framework Volatility (Advanced Memory Forensics Framework) :: Framework

Volatility Framework is a Advanced Memory Forensics Framework. The Volatility Framework is a completely open collection of tools , imp...

Read more »

OCFA (Open Computer Forensics Architecture) :: Framework OCFA (Open Computer Forensics Architecture) :: Framework

The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency [...

Read more »

Liffy (Local File Inclusion Exploitation) :: Tools Liffy (Local File Inclusion Exploitation) :: Tools

Liffy is a tool to exploit local file inclusion vulnerability using the built-in wrappers php://input, data://, and a process control ...

Read more »

NBTScan (Scans for Open NETBIOS Name Servers) :: Tools NBTScan (Scans for Open NETBIOS Name Servers) :: Tools

nbtscan is a command-line tool that scans for open NETBIOS nameservers on a local or remote TCP/IP network , and this is a first step ...

Read more »

Lynis (Security and System Auditing) :: Tools Lynis (Security and System Auditing) :: Tools

Lynis is a Security and system auditing tool to harden Linux systems. Lynis is an auditing tool for Unix/Linux (specialists). It sca...

Read more »

Autopsy (Digital Investigation Analysis) :: Tools Autopsy (Digital Investigation Analysis) :: Tools

Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit . Together, they can anal...

Read more »

RegistryDecoder (Windows Registry Forensics) :: Tools RegistryDecoder (Windows Registry Forensics) :: Tools

RegistryDecoder is a automated Acquisition, Analysis, and Reporting of Registry Contents . Registry Decoder provides a single tool in w...

Read more »

Hook Analyzer (Malware Analysis and Cyber Intelligence) :: Tools Hook Analyzer (Malware Analysis and Cyber Intelligence) :: Tools

Hook Analyser is a malware analysis and cyber intelligence (gathering and analysis) utility. As well as Hook Analyzer performs spawn ...

Read more »

GDB GNU Debugger :: Tools GDB GNU Debugger :: Tools

GDB, the GNU Project debugger , allows you to see what is going on `inside' another program while it executes -- or what another pr...

Read more »

WinDbg (Windows Debugger) :: Tools WinDbg (Windows Debugger) :: Tools

WinDbg is a graphical debugger from Microsoft . It is actually just one component of the Debugging Tools for Windows package , which...

Read more »

Immunity Debugger :: Tools Immunity Debugger :: Tools

Immunity Debugger is a powerful new way to write exploits, analyze malware , and reverse engineer binary files. It builds on a solid ...

Read more »

Patriot NG (Changes Detection in Windows or in Network) :: Tools Patriot NG (Changes Detection in Windows or in Network) :: Tools

Patriot NG is a 'Host IDS' tool which allows real time monitoring of changes in Win dows systems or Network attacks. Patrio...

Read more »

RadioGraPhy (Windows Forensics):: Tools RadioGraPhy (Windows Forensics):: Tools

Radiography is a forensic tool which grabs as much information as possible from a Windows system. Its checks: Registry keys relat...

Read more »

Resource Hacker :: Tools Resource Hacker :: Tools

Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit & 64bit Windows executa...

Read more »

Nessus Vulnerability Scanner :: Tools Nessus Vulnerability Scanner :: Tools

  Nessus Vulnereability Scanner is one of the most powerful, popular and capable vulnerability scanners, particularly for UNIX or Wind...

Read more »

XMPPloit - Attack XMPP Connections :: Tools XMPPloit - Attack XMPP Connections :: Tools

XMPPloit is a command-line tool to attack XMPP connections , allowing the attacker to place a gateway between the client and the serv...

Read more »

Ncrack (High-speed Network Authentication Cracking Tool) :: Tools Ncrack (High-speed Network Authentication Cracking Tool) :: Tools

Ncrack is a High-speed Network Authentication Cracking Tool . It was built to help companies secure their networks by proactively test...

Read more »
 
Top