Home
Categories
π
Osint
π©
Brute-force
π₯·
Active directory
π΅
Wireless security
π©οΈ
Cloud Security
π§©
Network assessment
πΈοΈ
Web vulnerability detection
πΆ
Wireless Attacks
π
Information Gathering Tools
β οΈ
Stress Testing
βοΈ
Forensics Tools
π
Sniffing & Spoofing
π«
Vulnerability Analysis
Tools
Blog
Tools
βοΈ
Forensics Tools
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Explore other tools categories:
π
Osint
π©
Brute-force
π₯·
Active directory
π΅
Wireless security
π©οΈ
Cloud Security
π§©
Network assessment
πΈοΈ
Web vulnerability detection
πΆ
Wireless Attacks
π
Information Gathering Tools
π«
Vulnerability Analysis
βοΈ
Forensics Tools
π
Sniffing & Spoofing
β οΈ
Stress Testing
20.11.23
Autopsy
With its extensive feature set for examining disc images and file systems, Autopsy is a potent digital forensics tool.
November 20, 2023
20.11.23
Guymager
Guymager is a potent imaging tool made for data gathering and digital forensics.
November 20, 2023
20.11.23
Plaso
A potent digital forensics tool for timeline analysis is Plaso, sometimes called log2timeline. It is particularly good at making super-timelines, which provide investigators a chronological rundown of everything that has happened on a system.
November 20, 2023
20.11.23
Chkrootkit
A straightforward yet powerful tool for locating rootkits on Unix-based systems is called Chkrootkit. Malicious software called rootkits can undermine a system's security by granting unauthorised access and disguising their existence.
November 20, 2023
5.4.24
Volatility
Volatility, also recognized as a versatile memory forensics framework, is an open-source tool invaluable for digital forensics investigations and memory analysis. When integrated with Kali Linux, the premier operating system for penetration testing and forensic analysis, Volatility emerges as a crucial asset for extracting valuable information from volatile memory dumps. In this article, we'll delve into Volatility's capabilities, provide guidelines for its installation on Kali Linux, and outline efficient utilization techniques for memory analysis in digital forensics.
April 5, 2024
5.4.24
Foremost
Foremost, also referred to as a digital forensic tool, is an open-source program designed for file recovery and data carving. Foremost proves invaluable in digital investigations, aiding in the extraction of files from various storage media, even if metadata is lost or damaged. When integrated with Kali Linux, the preferred operating system for penetration testing and forensic analysis, Foremost emerges as an indispensable tool. In this post, we'll explore Foremost's functionalities, provide instructions on how to install it on Kali Linux, and discuss efficient utilization techniques for file recovery in digital forensics.
April 5, 2024
5.4.24
Cuckoo
Cuckoo, also recognized as a malware analysis automation system, is an open-source platform tailored for automated malware analysis. Cuckoo proves invaluable in security assessments and research, offering capabilities for identifying and analyzing malware behavior, vulnerabilities, and network activity. When paired with Kali Linux, the preferred operating system for penetration testing, Cuckoo emerges as an essential tool for identifying and understanding malicious threats. In this post, we'll delve into Cuckoo's functionalities, provide instructions on how to install it on Kali Linux, and discuss efficient utilization techniques for automated malware analysis.
April 5, 2024
5.4.24
Magnet Forensic
Digital Evidence Investigator (DEI) is a comprehensive forensic software solution developed by Magnet Forensics, designed to assist digital investigators in analyzing and extracting evidence from various digital sources. When combined with the versatile penetration testing distro Kali Linux, DEI becomes an invaluable tool for forensic professionals, law enforcement agencies, and cybersecurity experts. Below, we'll delve into the features, installation process, and how to effectively use Digital Evidence Investigator on Kali Linux.
April 5, 2024