USB Forensics

USB Forensics – Reconstruction of Digital Evidence from USB Drive

Digitial Forensics analysis of USB forensics include preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal. Disk Imaging -...
Analyzing embedded files

Binwalk – Analyzing Embedded Files and Executable Code with Firmware Images

Binwalk is a device for looking a given binary image for embedded documents and executable code. Specifically, it's far designed for figuring out files and code embedded inner of firmware images. Binwalk uses the libmagic library, so it is compatible...
Forensics Tool

p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool

P0f is a OS Fingerprinting and Forensics Tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in...
windows auditing tool

WINSpect-Powershell based Windows Security Auditing Toolbox

WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results of this audit can be useful for further hardening.Download the WINSpect Tool Here. Installation Open the Powershell with admin privileges and run the script Features of this...
Computer Forensics tools

Most Important Computer Forensics Tools for Hackers and Security Professionals

Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence to find an indicator of compromise and take an appropriate mitigation Steps. Here you can find the Comprehensive...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended