Echo Mirage 3.1 :: Tools
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
Echo Mirage 3.1 :: Tools
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...
Distributed Network Attack (DNA) :: Framework
Distributed Network Attack (DNA) is a new approach to recovering password protected files . In the past, recoveries have been limi...
Volatility (Advanced Memory Forensics Framework) :: Framework
Volatility Framework is a Advanced Memory Forensics Framework. The Volatility Framework is a completely open collection of tools , imp...
OCFA (Open Computer Forensics Architecture) :: Framework
The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency [...
Liffy (Local File Inclusion Exploitation) :: Tools
Liffy is a tool to exploit local file inclusion vulnerability using the built-in wrappers php://input, data://, and a process control ...
NBTScan (Scans for Open NETBIOS Name Servers) :: Tools
nbtscan is a command-line tool that scans for open NETBIOS nameservers on a local or remote TCP/IP network , and this is a first step ...
Lynis (Security and System Auditing) :: Tools
Lynis is a Security and system auditing tool to harden Linux systems. Lynis is an auditing tool for Unix/Linux (specialists). It sca...
Autopsy (Digital Investigation Analysis) :: Tools
Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit . Together, they can anal...
RegistryDecoder (Windows Registry Forensics) :: Tools
RegistryDecoder is a automated Acquisition, Analysis, and Reporting of Registry Contents . Registry Decoder provides a single tool in w...
Hook Analyzer (Malware Analysis and Cyber Intelligence) :: Tools
Hook Analyser is a malware analysis and cyber intelligence (gathering and analysis) utility. As well as Hook Analyzer performs spawn ...
GDB GNU Debugger :: Tools
GDB, the GNU Project debugger , allows you to see what is going on `inside' another program while it executes -- or what another pr...
WinDbg (Windows Debugger) :: Tools
WinDbg is a graphical debugger from Microsoft . It is actually just one component of the Debugging Tools for Windows package , which...
Immunity Debugger :: Tools
Immunity Debugger is a powerful new way to write exploits, analyze malware , and reverse engineer binary files. It builds on a solid ...
Patriot NG is a 'Host IDS' tool which allows real time monitoring of changes in Win dows systems or Network attacks. Patrio...
RadioGraPhy (Windows Forensics):: Tools
Radiography is a forensic tool which grabs as much information as possible from a Windows system. Its checks: Registry keys relat...
Resource Hacker :: Tools
Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit & 64bit Windows executa...
Nessus Vulnerability Scanner :: Tools
Nessus Vulnereability Scanner is one of the most powerful, popular and capable vulnerability scanners, particularly for UNIX or Wind...
XMPPloit - Attack XMPP Connections :: Tools
XMPPloit is a command-line tool to attack XMPP connections , allowing the attacker to place a gateway between the client and the serv...
Ncrack (High-speed Network Authentication Cracking Tool) :: Tools
Ncrack is a High-speed Network Authentication Cracking Tool . It was built to help companies secure their networks by proactively test...