
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...
Distributed Network Attack (DNA) is a new approach to recovering password protected files . In the past, recoveries have been limi...
Volatility Framework is a Advanced Memory Forensics Framework. The Volatility Framework is a completely open collection of tools , imp...
The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency [...
Liffy is a tool to exploit local file inclusion vulnerability using the built-in wrappers php://input, data://, and a process control ...
nbtscan is a command-line tool that scans for open NETBIOS nameservers on a local or remote TCP/IP network , and this is a first step ...
Lynis is a Security and system auditing tool to harden Linux systems. Lynis is an auditing tool for Unix/Linux (specialists). It sca...
Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit . Together, they can anal...
RegistryDecoder is a automated Acquisition, Analysis, and Reporting of Registry Contents . Registry Decoder provides a single tool in w...
Hook Analyser is a malware analysis and cyber intelligence (gathering and analysis) utility. As well as Hook Analyzer performs spawn ...
GDB, the GNU Project debugger , allows you to see what is going on `inside' another program while it executes -- or what another pr...
WinDbg is a graphical debugger from Microsoft . It is actually just one component of the Debugging Tools for Windows package , which...
Immunity Debugger is a powerful new way to write exploits, analyze malware , and reverse engineer binary files. It builds on a solid ...
Patriot NG is a 'Host IDS' tool which allows real time monitoring of changes in Win dows systems or Network attacks. Patrio...
Radiography is a forensic tool which grabs as much information as possible from a Windows system. Its checks: Registry keys relat...
Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit & 64bit Windows executa...
Nessus Vulnereability Scanner is one of the most powerful, popular and capable vulnerability scanners, particularly for UNIX or Wind...
XMPPloit is a command-line tool to attack XMPP connections , allowing the attacker to place a gateway between the client and the serv...
Ncrack is a High-speed Network Authentication Cracking Tool . It was built to help companies secure their networks by proactively test...