swap_digger is a bash script used to automate Linux swap analysis for post-exploitation or forensics purpose. It automates swap extraction and searches...
Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and...
This post details the forensics performed by Information security trainingprofessional during the clean-up operation. The expert also note specific WordPress security recommendations based...
WEFFLES is designed to be small and lightweight, both for speed of getting something deployed during an Incident Response and also for...
Easy-to-use live forensics toolbox for Linux endpoints written in Python & Flask. Capabilities ps View full process list Inspect process memory map...
srum-dump This program will create an excel spreadsheet containing forensics artifacts contained the SRUM (System Resource Utilization Manager) database. The program can...
Shadow is a unique discrete-event network simulator that runs real applications like Tor and Bitcoin, and distributed systems of thousands of nodes...
Security researchers from AccessNow have discovered a new Facebook phishing scam that can also fool a professional technical user into falling victim...
The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code...
OS X Auditor is a free Mac OS X computer forensics tool. OS X Auditor parses and hashes the following artifacts on...
r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary...
The firmware used by the Israeli mobile forensic firm Cellebrite was leaked online by one of its resellers, the McSira Professional Solutions....
It has happened to most of us. You deleted a file and realize you need it back. But is it really deleted?...
Welcome to my tutorial, today i will be showing you how to get someone’s ip once you have the person’s RAT. In...