SecureCheq version 1.0 – A Free Configuration Evaluator from Tripwire
November 13th, 2013 | by NJ Ouchn
Configuration failures, whether accidental or malicious, are some of the most pervasive risks in IT today. And often the most [&hellipNovember 13th, 2013 | by NJ Ouchn
Configuration failures, whether accidental or malicious, are some of the most pervasive risks in IT today. And often the most [&hellipNovember 5th, 2013 | by NJ Ouchn
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for [&hellipOctober 21st, 2013 | by NJ Ouchn
Sometime forensic investigators need to process digital images as evidence. There are some tools around, otherwise it is difficult to [&hellipApril 17th, 2013 | by NJ Ouchn
Cuckoo Sandbox is an Open Source software for automating analysis of suspicious files. To do so it makes use of [&hellipApril 17th, 2013 | by NJ Ouchn
ADEL which is meant as an abbreviation of “Android Data Extractor Lite”. ADEL was developed for versions 2.x of Android [&hellipApril 7th, 2013 | by NJ Ouchn
Evil Foca (Alpha Version) is a tool for Pentesters and Security Auditors to perform security testing in IPv4/ IPv6 data [&hellipApril 2nd, 2013 | by MaxiSoler
Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for [&hellipFebruary 15th, 2013 | by MaxiSoler
Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hiding [&hellipOctober 5th, 2012 | by NJ Ouchn
An international team of forensics experts, led by SANS Faculty Fellow Rob Lee, created the SANS Investigative Forensic Toolkit (SIFT) [&hellipOctober 5th, 2012 | by NJ Ouchn
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics Currently the [&hellip