Autopsy (Digital Investigation Analysis) :: Tools
Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit . Together, they can anal...
Autopsy (Digital Investigation Analysis) :: Tools
Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit . Together, they can anal...
Oryon C Portable (Intelligence Investigations) :: Tools
Oryon C Portable is a web browser designed to assist researchers in conducting Open Source Intelligence investigations . Oryon comes...
MobiSec (Mobile Penetration Testing) :: Distribution
The MobiSec Live Environment Mobile Testing open source project is a live environment for testing mobile environments, including d...
Hash Generator :: Tools
Hash Generator is the FREE universal hash generator tool which automates the generation of 14 different type of hashes or checksums. ...
TCPXtract (Network Traffic Extracting) :: Tools
tcpxtract is a tool for extracting files from network traffic based on file signatures. Extracting files based on file type headers and...
Revealer Toolkit (Forensics) :: Framework
Revealer Toolkit is a framework and simple scripts for computer forensics . It uses Brian Carrier's The Sleuth Kit as the backbo...
BTCrack (Bluetooth PIN Bruteforce) :: Tools
BTCrack is the worlds first Bluetooth Pass phrase (PIN) bruteforce tool , BTCrack will bruteforce the Passkey and the Link key from...
iPhone Analyzer :: Tools
iPhone Analzyer allows you to forensically examine or recover date from in iOS device . It principally works by importing backups pr...
RegistryDecoder (Windows Registry Forensics) :: Tools
RegistryDecoder is a automated Acquisition, Analysis, and Reporting of Registry Contents . Registry Decoder provides a single tool in w...
USB Write Blocker :: Tools
USB Write blocker is an application that will use the windows registry to write block USB devices . It is a useful tool for those who...
DumpIt is a fusion of two trusted tools , win32dd and win64dd, combined into one one executable. DumpIt is designed to be provided to...
iScan Online :: Tools
iScan Online is the vulnerability scanning solutions for Computing and Mobility. iScan Online delivers its vulnerability scanning ...
Online WPA Cracker :: Tools
Online WPA Cracker is a online tool that crack you WPA encryption but you have to pay for it. An online WPA cracking tool which auto...
Hook Analyzer (Malware Analysis and Cyber Intelligence) :: Tools
Hook Analyser is a malware analysis and cyber intelligence (gathering and analysis) utility. As well as Hook Analyzer performs spawn ...
dotDefender (Web Application Firewall) :: Tools
dotDefender is the market-leading software Web Application Firewall (WAF) . dotDefender boasts enterprise-class security, advanced ...
GDB GNU Debugger :: Tools
GDB, the GNU Project debugger , allows you to see what is going on `inside' another program while it executes -- or what another pr...
Download Evad3rs iOS 7 Jailbreak :: Tools
Evasi0n Jailbreaking tools available for Apple iOS 7 users. This jailbreak utility/tool made by Evad3rs team after 3 months of iOS 7...
Beast-Check (SSL/TLS BEAST Vulnerability Check) :: Tools
Beast-Chec k is a small perl script that checks a target server whether it is prone to BEAST vulnerability via target preferred ciphe...
Flunym0us (Wordpress Vulnerability Scanner) :: Tools
Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python ...
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework . It...
Turbo Assembler :: Tools
Turbo Assembler 5.0 is a full featured stand-alone assembler. This product includes all the tools needed to create and debug assem...
WinDbg (Windows Debugger) :: Tools
WinDbg is a graphical debugger from Microsoft . It is actually just one component of the Debugging Tools for Windows package , which...
Immunity Debugger :: Tools
Immunity Debugger is a powerful new way to write exploits, analyze malware , and reverse engineer binary files. It builds on a solid ...
Comodo Instant Malware Analysis :: Tools
COMODO Automated Malware Analysis System will scan it and report back its findings. If you have a suspicious file, please submit it onli...